Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/04/2025, 06:33

General

  • Target

    2320a574556780b6f4376b358bfdce5af24c0bc58d7b4818af64851f6bdd9f4d.exe

  • Size

    6.2MB

  • MD5

    205bcd39dbe0368fe176217105649965

  • SHA1

    5cf43aecd3061a98c678f3a964ed08185e60885c

  • SHA256

    2320a574556780b6f4376b358bfdce5af24c0bc58d7b4818af64851f6bdd9f4d

  • SHA512

    4d2fec414486d8feb5364606ae7c29a26868f15c37713bca3f79f555a95b7d7d8e40afe6d634a19d03a84f66dedfb8e66b26dac65c54ac0ba060a5def321208c

  • SSDEEP

    196608:NCD73hgOdLENCWYhqDv8utl1pinGjHpqEJ76gpH:NCP3XdLGCWYCBiGT4jM

Malware Config

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

lumma

C2

https://5pepperiop.digital/oage

https://jrxsafer.top/shpaoz

https://plantainklj.run/opafg

https://puerrogfh.live/iqwez

https://quavabvc.top/iuzhd

https://advennture.top/GKsiio

https://targett.top/dsANGt

https://rambutanvcx.run/adioz

https://ywmedici.top/noagis

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
  • Downloads MZ/PE file 15 IoCs
  • Uses browser remote debugging 2 TTPs 15 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 16 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 45 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Suspicious use of SetThreadContext 46 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 11 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 44 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 25 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 9 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 29 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2320a574556780b6f4376b358bfdce5af24c0bc58d7b4818af64851f6bdd9f4d.exe
    "C:\Users\Admin\AppData\Local\Temp\2320a574556780b6f4376b358bfdce5af24c0bc58d7b4818af64851f6bdd9f4d.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3516
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\M8j28.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\M8j28.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5480
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1T30B3.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1T30B3.exe
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3408
        • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
          "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Downloads MZ/PE file
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4720
          • C:\Users\Admin\AppData\Local\Temp\10475710101\AfkeY2q.exe
            "C:\Users\Admin\AppData\Local\Temp\10475710101\AfkeY2q.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3856
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
              6⤵
                PID:1396
            • C:\Users\Admin\AppData\Local\Temp\10479900101\CmvdYC4.exe
              "C:\Users\Admin\AppData\Local\Temp\10479900101\CmvdYC4.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:3232
              • C:\Users\Admin\AppData\Local\Temp\onefile_3232_133884812198182163\ZSoeRVBe.exe
                C:\Users\Admin\AppData\Local\Temp\10479900101\CmvdYC4.exe
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of AdjustPrivilegeToken
                PID:6120
            • C:\Users\Admin\AppData\Local\Temp\10480540101\ibC8xs1.exe
              "C:\Users\Admin\AppData\Local\Temp\10480540101\ibC8xs1.exe"
              5⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:5564
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\jrtyirg1\jrtyirg1.cmdline"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:4892
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFF40.tmp" "c:\Users\Admin\AppData\Local\Temp\jrtyirg1\CSCCB5751A524D84AE3BAA9AFA13555C2C2.TMP"
                  7⤵
                    PID:5252
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                  6⤵
                    PID:4780
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                    6⤵
                    • Downloads MZ/PE file
                    • Accesses Microsoft Outlook accounts
                    • Accesses Microsoft Outlook profiles
                    • Suspicious use of SetThreadContext
                    • Drops file in Program Files directory
                    • System Location Discovery: System Language Discovery
                    • Checks processor information in registry
                    • Suspicious behavior: AddClipboardFormatListener
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SetWindowsHookEx
                    • outlook_office_path
                    • outlook_win_path
                    PID:4708
                    • C:\Windows\system32\rundll32.exe
                      "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                      7⤵
                        PID:5860
                      • C:\Windows\system32\rundll32.exe
                        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                        7⤵
                          PID:1544
                        • C:\Windows\system32\rundll32.exe
                          "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                          7⤵
                            PID:2684
                          • C:\Windows\system32\rundll32.exe
                            "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                            7⤵
                              PID:5504
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              --restore-last-session --remote-debugging-port=9223 --remote-allow-origins=* --headless "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --profile-directory="Default"
                              7⤵
                              • Uses browser remote debugging
                              • Enumerates system info in registry
                              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                              • Suspicious use of FindShellTrayWindow
                              PID:3052
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ff9ac54dcf8,0x7ff9ac54dd04,0x7ff9ac54dd10
                                8⤵
                                  PID:1788
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --headless --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2020,i,14106149552861977205,10304432825834168979,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2012 /prefetch:2
                                  8⤵
                                    PID:5964
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2248,i,14106149552861977205,10304432825834168979,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=1600 /prefetch:3
                                    8⤵
                                      PID:3860
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2888,i,14106149552861977205,10304432825834168979,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2880 /prefetch:8
                                      8⤵
                                        PID:1200
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3252,i,14106149552861977205,10304432825834168979,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3248 /prefetch:1
                                        8⤵
                                        • Uses browser remote debugging
                                        PID:1548
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3344,i,14106149552861977205,10304432825834168979,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3360 /prefetch:1
                                        8⤵
                                        • Uses browser remote debugging
                                        PID:2432
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4236,i,14106149552861977205,10304432825834168979,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4288 /prefetch:2
                                        8⤵
                                        • Uses browser remote debugging
                                        PID:5636
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4696,i,14106149552861977205,10304432825834168979,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4692 /prefetch:1
                                        8⤵
                                        • Uses browser remote debugging
                                        PID:2272
                                    • C:\Windows\system32\rundll32.exe
                                      "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                                      7⤵
                                        PID:1916
                                      • C:\Windows\system32\rundll32.exe
                                        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                                        7⤵
                                          PID:4808
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          --restore-last-session --remote-debugging-port=9225 --remote-allow-origins=* --headless "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --profile-directory="Default"
                                          7⤵
                                          • Uses browser remote debugging
                                          PID:3704
                                        • C:\Windows\system32\rundll32.exe
                                          "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                                          7⤵
                                            PID:4828
                                          • C:\Windows\system32\rundll32.exe
                                            "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                                            7⤵
                                              PID:5824
                                            • C:\Windows\system32\rundll32.exe
                                              "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                                              7⤵
                                                PID:5384
                                              • C:\Windows\system32\rundll32.exe
                                                "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                                                7⤵
                                                  PID:3552
                                                • C:\Windows\system32\rundll32.exe
                                                  "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                                                  7⤵
                                                    PID:5972
                                                  • C:\Windows\system32\rundll32.exe
                                                    "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                                                    7⤵
                                                      PID:872
                                                    • C:\Windows\system32\rundll32.exe
                                                      "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                                                      7⤵
                                                        PID:1460
                                                      • C:\Windows\system32\rundll32.exe
                                                        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                                                        7⤵
                                                          PID:5616
                                                        • C:\Windows\system32\rundll32.exe
                                                          "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                                                          7⤵
                                                            PID:5740
                                                          • C:\Windows\system32\rundll32.exe
                                                            "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                                                            7⤵
                                                              PID:1724
                                                            • C:\Windows\system32\rundll32.exe
                                                              "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                                                              7⤵
                                                                PID:1064
                                                              • C:\Windows\system32\rundll32.exe
                                                                "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                                                                7⤵
                                                                  PID:5872
                                                                • C:\Windows\system32\rundll32.exe
                                                                  "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                                                                  7⤵
                                                                    PID:4436
                                                                  • C:\Windows\system32\rundll32.exe
                                                                    "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                                                                    7⤵
                                                                      PID:2768
                                                                    • C:\Windows\system32\rundll32.exe
                                                                      "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                                                                      7⤵
                                                                        PID:1588
                                                                      • C:\Windows\system32\rundll32.exe
                                                                        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                                                                        7⤵
                                                                          PID:3004
                                                                        • C:\Windows\system32\rundll32.exe
                                                                          "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                                                                          7⤵
                                                                            PID:5804
                                                                          • C:\Windows\system32\rundll32.exe
                                                                            "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                                                                            7⤵
                                                                              PID:3024
                                                                            • C:\Windows\system32\rundll32.exe
                                                                              "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                                                                              7⤵
                                                                                PID:7776
                                                                              • C:\Windows\system32\rundll32.exe
                                                                                "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                                                                                7⤵
                                                                                  PID:7880
                                                                                • C:\Windows\system32\rundll32.exe
                                                                                  "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                                                                                  7⤵
                                                                                    PID:7404
                                                                                  • C:\Windows\system32\rundll32.exe
                                                                                    "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                                                                                    7⤵
                                                                                      PID:5496
                                                                                    • C:\Windows\system32\rundll32.exe
                                                                                      "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                                                                                      7⤵
                                                                                        PID:3492
                                                                                      • C:\Windows\system32\rundll32.exe
                                                                                        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                                                                                        7⤵
                                                                                          PID:24484
                                                                                        • C:\Windows\system32\rundll32.exe
                                                                                          "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                                                                                          7⤵
                                                                                            PID:24428
                                                                                      • C:\Users\Admin\AppData\Local\Temp\10480910101\DgQBvwg.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\10480910101\DgQBvwg.exe"
                                                                                        5⤵
                                                                                        • Executes dropped EXE
                                                                                        • Adds Run key to start application
                                                                                        • Suspicious use of SetThreadContext
                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:5216
                                                                                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\gpwp0x2h\gpwp0x2h.cmdline"
                                                                                          6⤵
                                                                                            PID:6052
                                                                                            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES487E.tmp" "c:\Users\Admin\AppData\Local\Temp\gpwp0x2h\CSCD2A9D3ED4A974E0F95942C6DFD2F7029.TMP"
                                                                                              7⤵
                                                                                                PID:2200
                                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                              6⤵
                                                                                                PID:4512
                                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                6⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:4160
                                                                                            • C:\Windows\SysWOW64\msiexec.exe
                                                                                              "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\10481850271\ArFLIYD.msi" /quiet
                                                                                              5⤵
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:4832
                                                                                            • C:\Users\Admin\AppData\Local\Temp\10489820101\amnew.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\10489820101\amnew.exe"
                                                                                              5⤵
                                                                                              • Checks computer location settings
                                                                                              • Executes dropped EXE
                                                                                              • Drops file in Windows directory
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:4836
                                                                                              • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"
                                                                                                6⤵
                                                                                                • Checks computer location settings
                                                                                                • Executes dropped EXE
                                                                                                • Adds Run key to start application
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:1464
                                                                                                • C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe"
                                                                                                  7⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Suspicious use of SetThreadContext
                                                                                                  PID:5984
                                                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                    8⤵
                                                                                                      PID:2068
                                                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                      8⤵
                                                                                                      • Downloads MZ/PE file
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      • Checks processor information in registry
                                                                                                      PID:3476
                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                                                                                        9⤵
                                                                                                        • Uses browser remote debugging
                                                                                                        • Checks processor information in registry
                                                                                                        • Enumerates system info in registry
                                                                                                        • Modifies data under HKEY_USERS
                                                                                                        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                                                        • Suspicious use of FindShellTrayWindow
                                                                                                        PID:5200
                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ff9ac54dcf8,0x7ff9ac54dd04,0x7ff9ac54dd10
                                                                                                          10⤵
                                                                                                            PID:4536
                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1584,i,17229338331781668534,15263709771629943704,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2124 /prefetch:3
                                                                                                            10⤵
                                                                                                              PID:4896
                                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2096,i,17229338331781668534,15263709771629943704,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2092 /prefetch:2
                                                                                                              10⤵
                                                                                                                PID:4424
                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2276,i,17229338331781668534,15263709771629943704,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2720 /prefetch:8
                                                                                                                10⤵
                                                                                                                  PID:6024
                                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3260,i,17229338331781668534,15263709771629943704,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3272 /prefetch:1
                                                                                                                  10⤵
                                                                                                                  • Uses browser remote debugging
                                                                                                                  PID:2504
                                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3280,i,17229338331781668534,15263709771629943704,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3316 /prefetch:1
                                                                                                                  10⤵
                                                                                                                  • Uses browser remote debugging
                                                                                                                  PID:4136
                                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4232,i,17229338331781668534,15263709771629943704,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3836 /prefetch:2
                                                                                                                  10⤵
                                                                                                                  • Uses browser remote debugging
                                                                                                                  PID:2116
                                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4604,i,17229338331781668534,15263709771629943704,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4688 /prefetch:1
                                                                                                                  10⤵
                                                                                                                  • Uses browser remote debugging
                                                                                                                  PID:1184
                                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5352,i,17229338331781668534,15263709771629943704,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5360 /prefetch:8
                                                                                                                  10⤵
                                                                                                                    PID:5976
                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5484,i,17229338331781668534,15263709771629943704,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5500 /prefetch:8
                                                                                                                    10⤵
                                                                                                                      PID:4172
                                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5364,i,17229338331781668534,15263709771629943704,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5668 /prefetch:8
                                                                                                                      10⤵
                                                                                                                        PID:4204
                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5604,i,17229338331781668534,15263709771629943704,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5592 /prefetch:8
                                                                                                                        10⤵
                                                                                                                          PID:5172
                                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5612,i,17229338331781668534,15263709771629943704,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5736 /prefetch:8
                                                                                                                          10⤵
                                                                                                                            PID:4860
                                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5356,i,17229338331781668534,15263709771629943704,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5576 /prefetch:8
                                                                                                                            10⤵
                                                                                                                              PID:2600
                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                                                                                                            9⤵
                                                                                                                            • Uses browser remote debugging
                                                                                                                            PID:3224
                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory=Default --edge-skip-compat-layer-relaunch
                                                                                                                              10⤵
                                                                                                                              • Uses browser remote debugging
                                                                                                                              • Enumerates system info in registry
                                                                                                                              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                                                              PID:6052
                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x238,0x23c,0x240,0x234,0x260,0x7ff9b060f208,0x7ff9b060f214,0x7ff9b060f220
                                                                                                                                11⤵
                                                                                                                                  PID:6104
                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2176,i,3053629944237714116,174940593411797194,262144 --variations-seed-version --mojo-platform-channel-handle=2172 /prefetch:2
                                                                                                                                  11⤵
                                                                                                                                    PID:852
                                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1944,i,3053629944237714116,174940593411797194,262144 --variations-seed-version --mojo-platform-channel-handle=2204 /prefetch:3
                                                                                                                                    11⤵
                                                                                                                                      PID:5172
                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2448,i,3053629944237714116,174940593411797194,262144 --variations-seed-version --mojo-platform-channel-handle=3304 /prefetch:8
                                                                                                                                      11⤵
                                                                                                                                        PID:5444
                                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3504,i,3053629944237714116,174940593411797194,262144 --variations-seed-version --mojo-platform-channel-handle=3568 /prefetch:1
                                                                                                                                        11⤵
                                                                                                                                        • Uses browser remote debugging
                                                                                                                                        PID:5592
                                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3512,i,3053629944237714116,174940593411797194,262144 --variations-seed-version --mojo-platform-channel-handle=3572 /prefetch:1
                                                                                                                                        11⤵
                                                                                                                                        • Uses browser remote debugging
                                                                                                                                        PID:3020
                                                                                                                                  • C:\ProgramData\kxt2v3e3wt.exe
                                                                                                                                    "C:\ProgramData\kxt2v3e3wt.exe"
                                                                                                                                    9⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Suspicious use of SetThreadContext
                                                                                                                                    PID:1604
                                                                                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                      10⤵
                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                      PID:4728
                                                                                                                                  • C:\ProgramData\rimglf379z.exe
                                                                                                                                    "C:\ProgramData\rimglf379z.exe"
                                                                                                                                    9⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Suspicious use of SetThreadContext
                                                                                                                                    PID:4792
                                                                                                                                    • C:\ProgramData\rimglf379z.exe
                                                                                                                                      "C:\ProgramData\rimglf379z.exe"
                                                                                                                                      10⤵
                                                                                                                                      • Executes dropped EXE
                                                                                                                                      • Checks processor information in registry
                                                                                                                                      PID:1264
                                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe"
                                                                                                                                        11⤵
                                                                                                                                          PID:6128
                                                                                                                                    • C:\ProgramData\v3w4euaiec.exe
                                                                                                                                      "C:\ProgramData\v3w4euaiec.exe"
                                                                                                                                      9⤵
                                                                                                                                      • Executes dropped EXE
                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                      PID:5980
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\6lGDvfSX\esVTsWUdaTVY8tnF.exe
                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\6lGDvfSX\esVTsWUdaTVY8tnF.exe 0
                                                                                                                                        10⤵
                                                                                                                                        • Drops startup file
                                                                                                                                        • Executes dropped EXE
                                                                                                                                        • Adds Run key to start application
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        PID:4728
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\6lGDvfSX\tCx0ZAZ8hctGLoZh.exe
                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\6lGDvfSX\tCx0ZAZ8hctGLoZh.exe 4728
                                                                                                                                          11⤵
                                                                                                                                          • Drops startup file
                                                                                                                                          • Executes dropped EXE
                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                          PID:4684
                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 4684 -s 1116
                                                                                                                                            12⤵
                                                                                                                                            • Program crash
                                                                                                                                            PID:24400
                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 4728 -s 1032
                                                                                                                                          11⤵
                                                                                                                                          • Program crash
                                                                                                                                          PID:18192
                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                      "C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\r1n7q" & exit
                                                                                                                                      9⤵
                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                      PID:7720
                                                                                                                                      • C:\Windows\SysWOW64\timeout.exe
                                                                                                                                        timeout /t 11
                                                                                                                                        10⤵
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        • Delays execution with timeout.exe
                                                                                                                                        PID:7760
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10028410101\joker1221.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\10028410101\joker1221.exe"
                                                                                                                                  7⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                                  PID:5044
                                                                                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                    8⤵
                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                    PID:4204
                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 4204 -s 1412
                                                                                                                                      9⤵
                                                                                                                                      • Program crash
                                                                                                                                      PID:5172
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10045380101\legendarik.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\10045380101\legendarik.exe"
                                                                                                                                  7⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                                  PID:1280
                                                                                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                    8⤵
                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                    PID:4284
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10046340101\EXE.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\10046340101\EXE.exe"
                                                                                                                                  7⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                  PID:2988
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10047850101\crypted.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\10047850101\crypted.exe"
                                                                                                                                  7⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                                  PID:924
                                                                                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                    8⤵
                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                    PID:116
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10054110101\f472ac9f9d.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\10054110101\f472ac9f9d.exe"
                                                                                                                                  7⤵
                                                                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                  • Checks BIOS information in registry
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Identifies Wine through registry keys
                                                                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                  PID:3816
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\10054110101\f472ac9f9d.exe"
                                                                                                                                    8⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                    PID:5336
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10054120101\6bdd1863ff.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\10054120101\6bdd1863ff.exe"
                                                                                                                                  7⤵
                                                                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                  • Checks BIOS information in registry
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Identifies Wine through registry keys
                                                                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                  PID:4204
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\10054120101\6bdd1863ff.exe"
                                                                                                                                    8⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                    PID:1896
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10489830101\CmvdYC4.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10489830101\CmvdYC4.exe"
                                                                                                                              5⤵
                                                                                                                              • Executes dropped EXE
                                                                                                                              PID:4440
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\onefile_4440_133884812704387879\ZSoeRVBe.exe
                                                                                                                                C:\Users\Admin\AppData\Local\Temp\10489830101\CmvdYC4.exe
                                                                                                                                6⤵
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Loads dropped DLL
                                                                                                                                PID:2632
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10489840101\qhjMWht.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10489840101\qhjMWht.exe"
                                                                                                                              5⤵
                                                                                                                              • Executes dropped EXE
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              PID:3400
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10489850101\Rm3cVPI.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10489850101\Rm3cVPI.exe"
                                                                                                                              5⤵
                                                                                                                              • Executes dropped EXE
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              PID:5700
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10489860101\AfkeY2q.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10489860101\AfkeY2q.exe"
                                                                                                                              5⤵
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Suspicious use of SetThreadContext
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              PID:3888
                                                                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                                                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
                                                                                                                                6⤵
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                PID:4452
                                                                                                                            • C:\Windows\SysWOW64\msiexec.exe
                                                                                                                              "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\10489870271\ArFLIYD.msi" /quiet
                                                                                                                              5⤵
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              PID:5480
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10489880101\9sWdA2p.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10489880101\9sWdA2p.exe"
                                                                                                                              5⤵
                                                                                                                              • Executes dropped EXE
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              PID:4412
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10489890101\c760a82587.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10489890101\c760a82587.exe"
                                                                                                                              5⤵
                                                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                              • Checks BIOS information in registry
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Identifies Wine through registry keys
                                                                                                                              • Writes to the Master Boot Record (MBR)
                                                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              PID:2992
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10489900101\larBxd7.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10489900101\larBxd7.exe"
                                                                                                                              5⤵
                                                                                                                              • Executes dropped EXE
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              PID:4000
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2R5826.exe
                                                                                                                          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2R5826.exe
                                                                                                                          3⤵
                                                                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                          • Checks BIOS information in registry
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Identifies Wine through registry keys
                                                                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                          PID:4708
                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                      C:\Windows\system32\cmd.exe /c rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"
                                                                                                                      1⤵
                                                                                                                      • Suspicious use of WriteProcessMemory
                                                                                                                      PID:5592
                                                                                                                      • C:\Windows\system32\rundll32.exe
                                                                                                                        rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"
                                                                                                                        2⤵
                                                                                                                          PID:824
                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                        C:\Windows\system32\cmd.exe /c rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\"
                                                                                                                        1⤵
                                                                                                                        • Suspicious use of WriteProcessMemory
                                                                                                                        PID:2272
                                                                                                                        • C:\Windows\system32\rundll32.exe
                                                                                                                          rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\"
                                                                                                                          2⤵
                                                                                                                            PID:4528
                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                          C:\Windows\system32\cmd.exe /c explorer.exe C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe
                                                                                                                          1⤵
                                                                                                                          • Suspicious use of WriteProcessMemory
                                                                                                                          PID:4088
                                                                                                                          • C:\Windows\explorer.exe
                                                                                                                            explorer.exe C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe
                                                                                                                            2⤵
                                                                                                                              PID:4276
                                                                                                                          • C:\Windows\explorer.exe
                                                                                                                            C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
                                                                                                                            1⤵
                                                                                                                            • Suspicious use of WriteProcessMemory
                                                                                                                            PID:5452
                                                                                                                            • C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe
                                                                                                                              "C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe"
                                                                                                                              2⤵
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Suspicious use of SetThreadContext
                                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                              • Suspicious use of WriteProcessMemory
                                                                                                                              PID:5832
                                                                                                                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                                                                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\jepanamw\jepanamw.cmdline"
                                                                                                                                3⤵
                                                                                                                                • Suspicious use of WriteProcessMemory
                                                                                                                                PID:2292
                                                                                                                                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                                                                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB17.tmp" "c:\Users\Admin\AppData\Local\Temp\jepanamw\CSC4CA9025E2BD8444CAD76F1DC609FAE.TMP"
                                                                                                                                  4⤵
                                                                                                                                    PID:1464
                                                                                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                  3⤵
                                                                                                                                    PID:3976
                                                                                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                    3⤵
                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                    PID:5956
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                1⤵
                                                                                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                • Checks BIOS information in registry
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Identifies Wine through registry keys
                                                                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                PID:5984
                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                C:\Windows\system32\cmd.exe /c explorer.exe C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe
                                                                                                                                1⤵
                                                                                                                                  PID:5604
                                                                                                                                  • C:\Windows\explorer.exe
                                                                                                                                    explorer.exe C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe
                                                                                                                                    2⤵
                                                                                                                                      PID:2072
                                                                                                                                  • C:\Windows\explorer.exe
                                                                                                                                    C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
                                                                                                                                    1⤵
                                                                                                                                      PID:3172
                                                                                                                                      • C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe
                                                                                                                                        "C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe"
                                                                                                                                        2⤵
                                                                                                                                        • Executes dropped EXE
                                                                                                                                        • Suspicious use of SetThreadContext
                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                        PID:3368
                                                                                                                                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                                                                          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\cmbnzy4d\cmbnzy4d.cmdline"
                                                                                                                                          3⤵
                                                                                                                                            PID:5228
                                                                                                                                            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                                                                              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES54D2.tmp" "c:\Users\Admin\AppData\Local\Temp\cmbnzy4d\CSC6F7F94E7107E49F7AB5E9E6D3752BA5.TMP"
                                                                                                                                              4⤵
                                                                                                                                                PID:4624
                                                                                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                              3⤵
                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                              PID:4736
                                                                                                                                        • C:\Windows\system32\msiexec.exe
                                                                                                                                          C:\Windows\system32\msiexec.exe /V
                                                                                                                                          1⤵
                                                                                                                                          • Enumerates connected drives
                                                                                                                                          • Drops file in Windows directory
                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                          PID:4812
                                                                                                                                          • C:\Users\Admin\AppData\Local\Insulin\steamerrorreporter.exe
                                                                                                                                            "C:\Users\Admin\AppData\Local\Insulin\steamerrorreporter.exe"
                                                                                                                                            2⤵
                                                                                                                                            • Executes dropped EXE
                                                                                                                                            • Loads dropped DLL
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            PID:4492
                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Servicemon\steamerrorreporter.exe
                                                                                                                                              C:\Users\Admin\AppData\Roaming\Servicemon\steamerrorreporter.exe
                                                                                                                                              3⤵
                                                                                                                                              • Executes dropped EXE
                                                                                                                                              • Loads dropped DLL
                                                                                                                                              • Suspicious use of SetThreadContext
                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                              • Suspicious behavior: MapViewOfSection
                                                                                                                                              PID:1324
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\remoteBggbv2.exe
                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\remoteBggbv2.exe
                                                                                                                                                4⤵
                                                                                                                                                  PID:32
                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                  C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                  4⤵
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  PID:2412
                                                                                                                                            • C:\Users\Admin\AppData\Local\Insulin\steamerrorreporter.exe
                                                                                                                                              "C:\Users\Admin\AppData\Local\Insulin\steamerrorreporter.exe"
                                                                                                                                              2⤵
                                                                                                                                              • Executes dropped EXE
                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                              PID:4176
                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Servicemon\steamerrorreporter.exe
                                                                                                                                                C:\Users\Admin\AppData\Roaming\Servicemon\steamerrorreporter.exe
                                                                                                                                                3⤵
                                                                                                                                                • Executes dropped EXE
                                                                                                                                                • Suspicious use of SetThreadContext
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                • Suspicious behavior: MapViewOfSection
                                                                                                                                                PID:5496
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\remoteBggbv2.exe
                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\remoteBggbv2.exe
                                                                                                                                                  4⤵
                                                                                                                                                    PID:3108
                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                    C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                    4⤵
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    PID:4896
                                                                                                                                            • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                                                                                                                              "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                                                                                                                              1⤵
                                                                                                                                                PID:3416
                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4204 -ip 4204
                                                                                                                                                1⤵
                                                                                                                                                  PID:5284
                                                                                                                                                • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                                                                                                                                  "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                                                                                                                                  1⤵
                                                                                                                                                    PID:3332
                                                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                                                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                                                                                                                    1⤵
                                                                                                                                                      PID:5028
                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                                                                                                                                      1⤵
                                                                                                                                                        PID:2672
                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                        1⤵
                                                                                                                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                        • Checks BIOS information in registry
                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                        • Identifies Wine through registry keys
                                                                                                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                        PID:740
                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                                                                                                        1⤵
                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                        PID:5956
                                                                                                                                                      • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                                                                                                                                        "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                                                                                                                                        1⤵
                                                                                                                                                          PID:2488
                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\6lGDvfSX\esVTsWUdaTVY8tnF.exe
                                                                                                                                                          1⤵
                                                                                                                                                            PID:2096
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\6lGDvfSX\esVTsWUdaTVY8tnF.exe
                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\6lGDvfSX\esVTsWUdaTVY8tnF.exe
                                                                                                                                                              2⤵
                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                              PID:6252
                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\8cU7ljXX\TJnSZ3p4qrtzPd1E.exe
                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\8cU7ljXX\TJnSZ3p4qrtzPd1E.exe 6252
                                                                                                                                                                3⤵
                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                PID:7604
                                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 7604 -s 640
                                                                                                                                                                  4⤵
                                                                                                                                                                  • Program crash
                                                                                                                                                                  PID:24452
                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 4728 -ip 4728
                                                                                                                                                            1⤵
                                                                                                                                                              PID:18144
                                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 704 -p 4684 -ip 4684
                                                                                                                                                              1⤵
                                                                                                                                                                PID:18152
                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 736 -p 7604 -ip 7604
                                                                                                                                                                1⤵
                                                                                                                                                                  PID:24412

                                                                                                                                                                Network

                                                                                                                                                                MITRE ATT&CK Enterprise v15

                                                                                                                                                                Replay Monitor

                                                                                                                                                                Loading Replay Monitor...

                                                                                                                                                                Downloads

                                                                                                                                                                • C:\Config.Msi\e585cf3.rbs

                                                                                                                                                                  Filesize

                                                                                                                                                                  8KB

                                                                                                                                                                  MD5

                                                                                                                                                                  6fdf23b5202149909b088b556f1c49cb

                                                                                                                                                                  SHA1

                                                                                                                                                                  67131f033ab5c7160d20959f872460c382b2b800

                                                                                                                                                                  SHA256

                                                                                                                                                                  d804f5ef542bf9cd17aeae464820b45be47bf81ea16b0abec0899eae912c1b91

                                                                                                                                                                  SHA512

                                                                                                                                                                  2f4da0422508209e3c26ff392e10c4b6705a53a573882495e16da1487c0f504aa80abfe312e1b80123a6fbd2d483c84ad1167315875e0398161f4705a2027e0f

                                                                                                                                                                • C:\Config.Msi\e585cf7.rbs

                                                                                                                                                                  Filesize

                                                                                                                                                                  3KB

                                                                                                                                                                  MD5

                                                                                                                                                                  049783c85ec9fde801c66e5c57066e73

                                                                                                                                                                  SHA1

                                                                                                                                                                  1e39d1a64558337743455909cae9cdf4af79eb46

                                                                                                                                                                  SHA256

                                                                                                                                                                  56a085b5e9bc8a53ebe3477cbfbb69c0afcd6d922254610ef276452d4e05e73f

                                                                                                                                                                  SHA512

                                                                                                                                                                  b9f4071fce80ce4166c4f46403f6d0769b582698a6ea8f0e2c83249224f3effa899d0eab889c67f93ecf49fb5a490bee2b69476a0fcec2c08ecb7d1ec082f484

                                                                                                                                                                • C:\ProgramData\SO73LmW2YazN

                                                                                                                                                                  Filesize

                                                                                                                                                                  40KB

                                                                                                                                                                  MD5

                                                                                                                                                                  dfd4f60adc85fc874327517efed62ff7

                                                                                                                                                                  SHA1

                                                                                                                                                                  f97489afb75bfd5ee52892f37383fbc85aa14a69

                                                                                                                                                                  SHA256

                                                                                                                                                                  c007da2e5fd780008f28336940b427c3bfd509c72a40bfb7759592149ff3606e

                                                                                                                                                                  SHA512

                                                                                                                                                                  d76f75b1b5b23aa4f87c53ce44c3d3b7e41a44401e53d89f05a114600ea3dcd8beda9ca1977b489ac6ea5586cf26e47396e92d4796c370e89fab0aa76f38f3c4

                                                                                                                                                                • C:\ProgramData\kxt2v3e3wt.exe

                                                                                                                                                                  Filesize

                                                                                                                                                                  584KB

                                                                                                                                                                  MD5

                                                                                                                                                                  2e56fa5b962d651c073c02467de8e001

                                                                                                                                                                  SHA1

                                                                                                                                                                  9667eed96a021d201ac35061bec780fca44a4207

                                                                                                                                                                  SHA256

                                                                                                                                                                  cf35a65bf2b0b1aa84c9629e32510475f87502e0c8a2745f4a53d7bdaa5bfd10

                                                                                                                                                                  SHA512

                                                                                                                                                                  5ead0d6e435b691ae9276468f2a24096db92cb167f8d03ed0f156f39634f91bf3ffde46b4865ea247e519ff2311f2b241d6ed2bbbe7a632b0ba3335ccfd03274

                                                                                                                                                                • C:\ProgramData\rimglf379z.exe

                                                                                                                                                                  Filesize

                                                                                                                                                                  952KB

                                                                                                                                                                  MD5

                                                                                                                                                                  f258ba9ca646b9749d7f22a3dfdc77d2

                                                                                                                                                                  SHA1

                                                                                                                                                                  36ee4ef9e49e0ebb8973c8f50849d6367c03e69b

                                                                                                                                                                  SHA256

                                                                                                                                                                  fcc3edcd526b0c746998d72af8ce9cc29b0bd801f767078cc472f93d57eee9ef

                                                                                                                                                                  SHA512

                                                                                                                                                                  764ecce1c087bceb9dbaab806bce134dae40a0a89a8aa6ab9e566bf2206ca79850cb2a109111455f9c14dbbdb6783193958c9007f7780d444e3837fa7dbdea3a

                                                                                                                                                                • C:\ProgramData\v3w4euaiec.exe

                                                                                                                                                                  Filesize

                                                                                                                                                                  251KB

                                                                                                                                                                  MD5

                                                                                                                                                                  58d3a0d574e37dc90b40603f0658abd2

                                                                                                                                                                  SHA1

                                                                                                                                                                  bf5419ce7000113002b8112ace2a9ac35d0dc557

                                                                                                                                                                  SHA256

                                                                                                                                                                  dcc05c3ac7ae22d601bcb7c97cfcda568f3041bd39b2fd8899282dfde83369a5

                                                                                                                                                                  SHA512

                                                                                                                                                                  df61329a32e9261b01c5b7d95e0d9a3fb8cc36e5d90ede72bc16befe00fb32c221898a8346db9de07c0f5dcba57dcdbb09a22ca8b73223f989d33ec433c3a90a

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                                                                                                                                                  Filesize

                                                                                                                                                                  40B

                                                                                                                                                                  MD5

                                                                                                                                                                  e583b3bcd0a283734268ceaab094ecf6

                                                                                                                                                                  SHA1

                                                                                                                                                                  31cd245bfde1e6f488730f052d6d37bbcfe470ea

                                                                                                                                                                  SHA256

                                                                                                                                                                  a143092cbf17b2e36e7b5e9ec5058a2154cca9ac0c2b5841855c07439ae6c509

                                                                                                                                                                  SHA512

                                                                                                                                                                  3168641a34bfeed7098fe87c75ab92337c94baf76d8725e295a411853381514748e71a0c4c527893a653e1a30d0cf1b540ede8ba480ca655af78cbec0b259e21

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                                                                                                                                  Filesize

                                                                                                                                                                  649B

                                                                                                                                                                  MD5

                                                                                                                                                                  e8ab23462af8f6d20a590e7b1c0d518a

                                                                                                                                                                  SHA1

                                                                                                                                                                  35e397d2d3136c8095fc6ba88ee2c5f6b2b0ec5a

                                                                                                                                                                  SHA256

                                                                                                                                                                  41cb3fc61b107eb786d62cb18fdd4040abc2077ee00383cb02b6b9686d470f18

                                                                                                                                                                  SHA512

                                                                                                                                                                  6bad9c7cc45c23483360fa5b4a4ec6be65ea640867c28e1b14a5195e6705c302ee5657d6c76277ad7952b3a1363059efecc37cc8c51412a3fd6bb4a349876fee

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                                                                                  Filesize

                                                                                                                                                                  2B

                                                                                                                                                                  MD5

                                                                                                                                                                  d751713988987e9331980363e24189ce

                                                                                                                                                                  SHA1

                                                                                                                                                                  97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                                                                                  SHA256

                                                                                                                                                                  4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                                                                                  SHA512

                                                                                                                                                                  b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                                  Filesize

                                                                                                                                                                  80KB

                                                                                                                                                                  MD5

                                                                                                                                                                  e0f7e4d1879236da4d25a84f4346516b

                                                                                                                                                                  SHA1

                                                                                                                                                                  fa8f77245dbdc198aadfb6ea09212de39b777638

                                                                                                                                                                  SHA256

                                                                                                                                                                  4bac86daaaa8801eb9dca6bacd6fa94d0c2726564435deb03644dc00c3c0ef6c

                                                                                                                                                                  SHA512

                                                                                                                                                                  eed60c9ab68a4381f2c1c2c337af61b580b3dea08b18b9cf4d25e14021f56b6c209072638d7c4175c2ee0c7a1589aeaa1007590f0fb4e10616d36d7c078205bb

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                  Filesize

                                                                                                                                                                  280B

                                                                                                                                                                  MD5

                                                                                                                                                                  690f9d619434781cadb75580a074a84d

                                                                                                                                                                  SHA1

                                                                                                                                                                  9c952a5597941ab800cae7262842ab6ac0b82ab1

                                                                                                                                                                  SHA256

                                                                                                                                                                  fc2e4954dbe6b72d5b09e1dc6360ea699437a2551355c2950da0b3d3a4779fc1

                                                                                                                                                                  SHA512

                                                                                                                                                                  d6b1da8e7febf926e8b6c316164efbbac22c7c3d9e4933a19fffba3d1667e1993cdeb5064aa53816c0c53f9d2c53e204772de987eb18adbb094a0fb84ae61fa9

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\43777905-94d9-469f-bdca-c5a9e2858271\index-dir\the-real-index

                                                                                                                                                                  Filesize

                                                                                                                                                                  1KB

                                                                                                                                                                  MD5

                                                                                                                                                                  ee45ac4fa124f13e9258eb30fba2a975

                                                                                                                                                                  SHA1

                                                                                                                                                                  cac3fd9f7fe8842fe231630b484801618871dccd

                                                                                                                                                                  SHA256

                                                                                                                                                                  4101f303c569fe41122727958c7252d6b511fd018f9705c002f2f60312ba034e

                                                                                                                                                                  SHA512

                                                                                                                                                                  ed6b2c50ef4a58055904da72df7ee54c022705c79896827785dadca122e2e32562c7de1388d9bb7099e7fbce2c51b4c7cde4dba41d9ea75a1c89cbf68d205d80

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\43777905-94d9-469f-bdca-c5a9e2858271\index-dir\the-real-index~RFe58e327.TMP

                                                                                                                                                                  Filesize

                                                                                                                                                                  1KB

                                                                                                                                                                  MD5

                                                                                                                                                                  8151cdf94b4f673a202c6082db64bb87

                                                                                                                                                                  SHA1

                                                                                                                                                                  9210d1f1ac38271c8a454e0cdfdfb65ea60bd266

                                                                                                                                                                  SHA256

                                                                                                                                                                  8adf8b9dbd579c8c7e7c11d1ba0bc48d408ec05caab92f899ee733f3c242d896

                                                                                                                                                                  SHA512

                                                                                                                                                                  4d3107d7719468b440bb13dfd4833d2f979b56d81929fe01e734fde340c72ce602d310388fad2853afaa32daadb72dc648186b9a7dcee0ae77f44cdd7b14d2b1

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                  Filesize

                                                                                                                                                                  40KB

                                                                                                                                                                  MD5

                                                                                                                                                                  04200ad39ae3070c8ddc262d2b9b898b

                                                                                                                                                                  SHA1

                                                                                                                                                                  d6c269ce0582daf1f4f2e509d431604f42b23e58

                                                                                                                                                                  SHA256

                                                                                                                                                                  55b8d67bca42e73dd83d7c206a26c579c9ea09f559fe328cf08e3ac083288fdb

                                                                                                                                                                  SHA512

                                                                                                                                                                  43bd0572c6215c6c8818d9659f4fe550f4b4bbbbfa5de3e9a6f833ce5c0d66be0f86fe7a9c94a6459613799aa8d08e9eacbf7f184ab98d08e5a9e3a8fb64425a

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe

                                                                                                                                                                  Filesize

                                                                                                                                                                  360KB

                                                                                                                                                                  MD5

                                                                                                                                                                  cbc01fb7800453f31807a3c8c53ce422

                                                                                                                                                                  SHA1

                                                                                                                                                                  a1b48d519d0f4b2d375d2e0f72c8f6076f63f7f6

                                                                                                                                                                  SHA256

                                                                                                                                                                  f6fbc80ec9718b3ad7fe6f0de73aedf067d1d43a283f677b58ae9f5d283560ca

                                                                                                                                                                  SHA512

                                                                                                                                                                  ad368855a6a49eb28325799cc5759b2d28b842da85209721d57c6770bff6d18f3a6b1fcc5146568c8ec98ff179c226da366a7ff3ab6032b164f85ba4ab26c4c9

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10028410101\joker1221.exe

                                                                                                                                                                  Filesize

                                                                                                                                                                  667KB

                                                                                                                                                                  MD5

                                                                                                                                                                  be32c5381d9dc0d8f7e467fe89286748

                                                                                                                                                                  SHA1

                                                                                                                                                                  0b7c1c54efbeaf199ac327d3b958dc5aae8131b6

                                                                                                                                                                  SHA256

                                                                                                                                                                  03b76f25a25cf571a329d3671ef89de970af306a097a3070c507296ca14efd56

                                                                                                                                                                  SHA512

                                                                                                                                                                  2161ad19021731288967f57e16f4b601f140ec05d7dfcd93adf2b3fd2a270b9326056a9495417b2faa0de86c61b1a15d855d0fcaca41bb2401fd23c134a65b47

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10045380101\legendarik.exe

                                                                                                                                                                  Filesize

                                                                                                                                                                  2.1MB

                                                                                                                                                                  MD5

                                                                                                                                                                  2a3fbf508bbf6c77fb9138e6bdc0c114

                                                                                                                                                                  SHA1

                                                                                                                                                                  8de41763cb3b5011ef1bb611fc258184b24ca258

                                                                                                                                                                  SHA256

                                                                                                                                                                  b87944aaa06658715496841be98f0f4791165f2d0d2a85267bf5fc80ef59f74f

                                                                                                                                                                  SHA512

                                                                                                                                                                  ed5cc3d07923986cc2751d1e5d833fc2a83de70fb68926378b9dbb0d83506ca7af39ce3a9bc46461c96bf5c2a35c04e106d56296b0d010a64a6c128057a9c84a

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10046340101\EXE.exe

                                                                                                                                                                  Filesize

                                                                                                                                                                  8.8MB

                                                                                                                                                                  MD5

                                                                                                                                                                  79615746124e8e66ce5d578fc7da30d5

                                                                                                                                                                  SHA1

                                                                                                                                                                  dd2b73e558fc20179fe4abc998ffcdab3551c705

                                                                                                                                                                  SHA256

                                                                                                                                                                  b6d8191caf0fb0a1e1e93094a67444b426bf2591a9aac51192de8de5fdddc73a

                                                                                                                                                                  SHA512

                                                                                                                                                                  11c886a7d222e8bba89ef43bbc8dc722fad9bcf4a519df2d1d984e5a03a74ce52bc5be1ac7c77acce57168e3d737438b4c3d292e64356277597dadd2a5e5417e

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10047850101\crypted.exe

                                                                                                                                                                  Filesize

                                                                                                                                                                  1.9MB

                                                                                                                                                                  MD5

                                                                                                                                                                  bb7dd9e8a9208dce433986550698e70a

                                                                                                                                                                  SHA1

                                                                                                                                                                  978999f07f696a2ffa437fafda988805cc77b316

                                                                                                                                                                  SHA256

                                                                                                                                                                  a542d24a574ba119fd926178d68f80f1923b4dffd149812e8d0103496c00fb77

                                                                                                                                                                  SHA512

                                                                                                                                                                  1378a77291502e50bdd318d5875652924a000b71d4179901321e2a9df587557bb93b613678afd71f234ee2627220c528fdd0239cfa7505b083c63b8fc8401c41

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10054110101\f472ac9f9d.exe

                                                                                                                                                                  Filesize

                                                                                                                                                                  4.4MB

                                                                                                                                                                  MD5

                                                                                                                                                                  cc7d2fe9fbaf5b40bfc221e23292dfd1

                                                                                                                                                                  SHA1

                                                                                                                                                                  27df4c0175470356a21b0a30ee6f26c4473ac104

                                                                                                                                                                  SHA256

                                                                                                                                                                  2be0f26ab8d27e983a5aaeb9cb1cfd32686674f6d8736e8d252f0dcd0ffb400b

                                                                                                                                                                  SHA512

                                                                                                                                                                  3bd42d97e6383983cdaa1439b2362d439e0b9b7b56bc68f6f3851bdb8578e19937958296ce08d181fb93f86ef914d6a4700116e4cb2398076c32b227ad8c02ff

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10054120101\6bdd1863ff.exe

                                                                                                                                                                  Filesize

                                                                                                                                                                  4.6MB

                                                                                                                                                                  MD5

                                                                                                                                                                  a69dab8c4e003e21b85606357982d8b8

                                                                                                                                                                  SHA1

                                                                                                                                                                  f6cf5d524dd3858c4eff7cc9e601f7f6440c768e

                                                                                                                                                                  SHA256

                                                                                                                                                                  f618dfdc731e42e0350cf5519317e9994bf42c7acb8c0c303565abf242f5738d

                                                                                                                                                                  SHA512

                                                                                                                                                                  6eb7d16f4865418498197486e1cc3365ca43064495c17479db7d2d56c04600cbe25b6da7ce36c563618e41af15d3fdab1f6da22b98f26da8c16ba7286a570d3b

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10475710101\AfkeY2q.exe

                                                                                                                                                                  Filesize

                                                                                                                                                                  250KB

                                                                                                                                                                  MD5

                                                                                                                                                                  7498e75d852bd5d52581a27717e2170a

                                                                                                                                                                  SHA1

                                                                                                                                                                  cd74cc40862ca565d147f7568dc3eea8443660f0

                                                                                                                                                                  SHA256

                                                                                                                                                                  11b8510f3b9ee2584adbe0120d4f753c67b804143a874585201d1855f0e97001

                                                                                                                                                                  SHA512

                                                                                                                                                                  cc1514775c51110d3748aad6b8c38db4b3bbe864c9329f47020115de5ebc98c1dceb8ec0eb9c27b375a5308e29cab8db587771602a85f99e066bb13b2222f214

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10479900101\CmvdYC4.exe

                                                                                                                                                                  Filesize

                                                                                                                                                                  11.6MB

                                                                                                                                                                  MD5

                                                                                                                                                                  e717d08f2813115fea75f3423b85bbce

                                                                                                                                                                  SHA1

                                                                                                                                                                  38da94cd4447748b80e919c13108ac61cd67c486

                                                                                                                                                                  SHA256

                                                                                                                                                                  cf7e773ff75c1b2f3df3a804eef95b68e5f9e5c3954cb60e85916da9512757c1

                                                                                                                                                                  SHA512

                                                                                                                                                                  b6912bd37710a68e754822c50d4ad9b5dd359b52bc226ea699829af36161dc2ce69014919f0a8cbfe2211ceb8de2128eed2169d2e92f577405234b05191c822f

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10480540101\ibC8xs1.exe

                                                                                                                                                                  Filesize

                                                                                                                                                                  18.2MB

                                                                                                                                                                  MD5

                                                                                                                                                                  2ed83182a2c54f262b0b63ab54ebe8f2

                                                                                                                                                                  SHA1

                                                                                                                                                                  4a3a0e023b11d89e21fe2d410d329dd3087cc259

                                                                                                                                                                  SHA256

                                                                                                                                                                  6b15d8a3ac38d07997df344bde98a1eabd49bf52f5fe4c8f256c60951859021d

                                                                                                                                                                  SHA512

                                                                                                                                                                  5c9656af97dafaaa29e415b39ee679ab3ac6c746b29ee79ac50a662b0c07003731d18a7e3fbc5941942ebda195e768a99c38116f75bbaa17fe6d2dba7ff33d97

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10481850271\ArFLIYD.msi

                                                                                                                                                                  Filesize

                                                                                                                                                                  4.4MB

                                                                                                                                                                  MD5

                                                                                                                                                                  26e9e46ba2e6aefc117b3e14e0c7151e

                                                                                                                                                                  SHA1

                                                                                                                                                                  20e7e1cc9e56af83795b78e0d2abd5d106b10156

                                                                                                                                                                  SHA256

                                                                                                                                                                  9c40b89a50ecaa4fa1276399b73e2665e8039f75156d983a1708e633cd695490

                                                                                                                                                                  SHA512

                                                                                                                                                                  6804f68232a3bb5d3a7659e0a9a08863a4a46306a09126ce45eba6e1d204edd9a9b52c51ee0b7e1385c41e89de356f3ca157d544dfcee9482b5fcb0642a3bb5f

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10489820101\amnew.exe

                                                                                                                                                                  Filesize

                                                                                                                                                                  429KB

                                                                                                                                                                  MD5

                                                                                                                                                                  22892b8303fa56f4b584a04c09d508d8

                                                                                                                                                                  SHA1

                                                                                                                                                                  e1d65daaf338663006014f7d86eea5aebf142134

                                                                                                                                                                  SHA256

                                                                                                                                                                  87618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f

                                                                                                                                                                  SHA512

                                                                                                                                                                  852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10489840101\qhjMWht.exe

                                                                                                                                                                  Filesize

                                                                                                                                                                  5.8MB

                                                                                                                                                                  MD5

                                                                                                                                                                  1dbdcaeaac26f7d34e872439997ee68d

                                                                                                                                                                  SHA1

                                                                                                                                                                  18c855f60fb83306f23634b10841655fb32a943b

                                                                                                                                                                  SHA256

                                                                                                                                                                  3142aecf9794be2f3894d3e1429d28f80918c5b41d516c9160e7cd3984a6f5a3

                                                                                                                                                                  SHA512

                                                                                                                                                                  aa447551d1d44d8b615a3d8a656c4085d024cc72fa9ead0b944c72dd7ff5bdab60fd7829440d9c2b4b2de364ca33d349e5716699e2cefd4835e35bbc7e421535

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10489850101\Rm3cVPI.exe

                                                                                                                                                                  Filesize

                                                                                                                                                                  354KB

                                                                                                                                                                  MD5

                                                                                                                                                                  27f0df9e1937b002dbd367826c7cfeaf

                                                                                                                                                                  SHA1

                                                                                                                                                                  7d66f804665b531746d1a94314b8f78343e3eb4f

                                                                                                                                                                  SHA256

                                                                                                                                                                  aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209

                                                                                                                                                                  SHA512

                                                                                                                                                                  ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10489880101\9sWdA2p.exe

                                                                                                                                                                  Filesize

                                                                                                                                                                  1.1MB

                                                                                                                                                                  MD5

                                                                                                                                                                  5adca22ead4505f76b50a154b584df03

                                                                                                                                                                  SHA1

                                                                                                                                                                  8c7325df64b83926d145f3d36900b415b8c0fa65

                                                                                                                                                                  SHA256

                                                                                                                                                                  aa7105a237dc64c8eb179f18d54641e5d7b9ab7da7bf71709a0d773f20154778

                                                                                                                                                                  SHA512

                                                                                                                                                                  6192d61e777c59aa80c236b2f3e961795b7ff9971327c4e3270803d356ecf38949811df680a372259a9638ccdb90fc1271fb844f1f35656d5b317c96081f396e

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10489890101\c760a82587.exe

                                                                                                                                                                  Filesize

                                                                                                                                                                  2.1MB

                                                                                                                                                                  MD5

                                                                                                                                                                  c16488e92a7114fea76e9cdd01ed34b4

                                                                                                                                                                  SHA1

                                                                                                                                                                  be56b82d1f885160ebaa768c9bd55daa20fd2541

                                                                                                                                                                  SHA256

                                                                                                                                                                  386b1e3d74b5f26201f1c6d44daac1c456839b23f104be984773c11f7d10fa54

                                                                                                                                                                  SHA512

                                                                                                                                                                  5235899fd54a2cc0139a49255f641515f9363d4468eb360c8bc6d3241ab060df8c71579e662db5fea62b1c1d34e6a6a87c116891ec7663971567d25954fa0005

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3e50q.exe

                                                                                                                                                                  Filesize

                                                                                                                                                                  2.4MB

                                                                                                                                                                  MD5

                                                                                                                                                                  d2e2c8285d8d690652854af7885ac785

                                                                                                                                                                  SHA1

                                                                                                                                                                  d4b01b3b3890c90cd6a9fb5e558478dcc9e80095

                                                                                                                                                                  SHA256

                                                                                                                                                                  90359c77d65c59c294d86cc0f253d95775cd515a0a31cc284ee6c470db1a479e

                                                                                                                                                                  SHA512

                                                                                                                                                                  fc5b28d656c154527da9f9cf5be450339f4351aab7b360758a418e2bd1e87c16703defb2d7a63e59d8cfdc0ecffb0359dd48da6ea6329066054c9f2ea83b12a6

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\M8j28.exe

                                                                                                                                                                  Filesize

                                                                                                                                                                  3.7MB

                                                                                                                                                                  MD5

                                                                                                                                                                  f7421eea0936a2dbb8b9fd63074b8ff8

                                                                                                                                                                  SHA1

                                                                                                                                                                  5c43f0f4330fdb3d99f5ef33c1f379faba5ddcd3

                                                                                                                                                                  SHA256

                                                                                                                                                                  09bb2ef480d804bf1da03f2070d3d886413c89c415cb054d0820edc491a1ebc5

                                                                                                                                                                  SHA512

                                                                                                                                                                  dc748f823c10bada4881f7f3441f54ba88afe0875a8335c3dd2425a4550aba98c47cc1069c583cd9d33a3455055fb352ccc4abb85a0c8f662ab8ade86f5bdaa7

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1T30B3.exe

                                                                                                                                                                  Filesize

                                                                                                                                                                  2.0MB

                                                                                                                                                                  MD5

                                                                                                                                                                  97af8843d70954f3ed3c16aa59b20977

                                                                                                                                                                  SHA1

                                                                                                                                                                  a52ff84d3d67560dd1aad05a349b26291014e5e3

                                                                                                                                                                  SHA256

                                                                                                                                                                  ccb416818afee5bae346f9203e562d46f4672caec3cffb7eb70778b637a8a477

                                                                                                                                                                  SHA512

                                                                                                                                                                  a53badc00f9c86425b785a5767adca27507b8dbc113ba280bdf1cca77c594da4548c5b8f6118e53ef679818fe635d53ca748ad944c29fdcfd1451c964dd3e2f6

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2R5826.exe

                                                                                                                                                                  Filesize

                                                                                                                                                                  2.0MB

                                                                                                                                                                  MD5

                                                                                                                                                                  f13bdfb6ad493bba4a66b742508de029

                                                                                                                                                                  SHA1

                                                                                                                                                                  dc1878547720d5ec7145ee2425059aaca44ad48d

                                                                                                                                                                  SHA256

                                                                                                                                                                  8cc97695523123f980a4dc8c4ec6c99c28f08d697f28d0cf4c91f2da0cabab56

                                                                                                                                                                  SHA512

                                                                                                                                                                  aff2e0f2b346448c12a91408f50bdf3bd6c2bfa95675c03e3dd0698f7a8d47edc186f32d082152c06fba38fcbb9eb4f0cb9d180cf261d2d4567a0b8a82338ca3

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\Crypto\Cipher\_raw_cbc.pyd

                                                                                                                                                                  Filesize

                                                                                                                                                                  12KB

                                                                                                                                                                  MD5

                                                                                                                                                                  40390f2113dc2a9d6cfae7127f6ba329

                                                                                                                                                                  SHA1

                                                                                                                                                                  9c886c33a20b3f76b37aa9b10a6954f3c8981772

                                                                                                                                                                  SHA256

                                                                                                                                                                  6ba9c910f755885e4d356c798a4dd32d2803ea4cfabb3d56165b3017d0491ae2

                                                                                                                                                                  SHA512

                                                                                                                                                                  617b963816838d649c212c5021d7d0c58839a85d4d33bbaf72c0ec6ecd98b609080e9e57af06fa558ff302660619be57cc974282826ab9f21ae0d80fbaa831a1

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\Crypto\Cipher\_raw_cfb.pyd

                                                                                                                                                                  Filesize

                                                                                                                                                                  12KB

                                                                                                                                                                  MD5

                                                                                                                                                                  899895c0ed6830c4c9a3328cc7df95b6

                                                                                                                                                                  SHA1

                                                                                                                                                                  c02f14ebda8b631195068266ba20e03210abeabc

                                                                                                                                                                  SHA256

                                                                                                                                                                  18d568c7be3e04f4e6026d12b09b1fa3fae50ff29ac3deaf861f3c181653e691

                                                                                                                                                                  SHA512

                                                                                                                                                                  0b4c50e40af92bc9589668e13df417244274f46f5a66e1fc7d1d59bc281969ba319305becea119385f01cc4603439e4b37afa2cf90645425210848a02839e3e7

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\Crypto\Cipher\_raw_ecb.pyd

                                                                                                                                                                  Filesize

                                                                                                                                                                  10KB

                                                                                                                                                                  MD5

                                                                                                                                                                  80bb1e0e06acaf03a0b1d4ef30d14be7

                                                                                                                                                                  SHA1

                                                                                                                                                                  b20cac0d2f3cd803d98a2e8a25fbf65884b0b619

                                                                                                                                                                  SHA256

                                                                                                                                                                  5d1c2c60c4e571b88f27d4ae7d22494bed57d5ec91939e5716afa3ea7f6871f6

                                                                                                                                                                  SHA512

                                                                                                                                                                  2a13ab6715b818ad62267ab51e55cd54714aebf21ec9ea61c2aefd56017dc84a6b360d024f8682a2e105582b9c5fe892ecebd2bef8a492279b19ffd84bc83fa5

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\VCRUNTIME140_1.dll

                                                                                                                                                                  Filesize

                                                                                                                                                                  48KB

                                                                                                                                                                  MD5

                                                                                                                                                                  f8dfa78045620cf8a732e67d1b1eb53d

                                                                                                                                                                  SHA1

                                                                                                                                                                  ff9a604d8c99405bfdbbf4295825d3fcbc792704

                                                                                                                                                                  SHA256

                                                                                                                                                                  a113f192195f245f17389e6ecbed8005990bcb2476ddad33f7c4c6c86327afe5

                                                                                                                                                                  SHA512

                                                                                                                                                                  ba7f8b7ab0deb7a7113124c28092b543e216ca08d1cf158d9f40a326fb69f4a2511a41a59ea8482a10c9ec4ec8ac69b70dfe9ca65e525097d93b819d498da371

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_bz2.pyd

                                                                                                                                                                  Filesize

                                                                                                                                                                  83KB

                                                                                                                                                                  MD5

                                                                                                                                                                  30f396f8411274f15ac85b14b7b3cd3d

                                                                                                                                                                  SHA1

                                                                                                                                                                  d3921f39e193d89aa93c2677cbfb47bc1ede949c

                                                                                                                                                                  SHA256

                                                                                                                                                                  cb15d6cc7268d3a0bd17d9d9cec330a7c1768b1c911553045c73bc6920de987f

                                                                                                                                                                  SHA512

                                                                                                                                                                  7d997ef18e2cbc5bca20a4730129f69a6d19abdda0261b06ad28ad8a2bddcdecb12e126df9969539216f4f51467c0fe954e4776d842e7b373fe93a8246a5ca3f

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_ctypes.pyd

                                                                                                                                                                  Filesize

                                                                                                                                                                  122KB

                                                                                                                                                                  MD5

                                                                                                                                                                  5377ab365c86bbcdd998580a79be28b4

                                                                                                                                                                  SHA1

                                                                                                                                                                  b0a6342df76c4da5b1e28a036025e274be322b35

                                                                                                                                                                  SHA256

                                                                                                                                                                  6c5f31bef3fdbff31beac0b1a477be880dda61346d859cf34ca93b9291594d93

                                                                                                                                                                  SHA512

                                                                                                                                                                  56f28d431093b9f08606d09b84a392de7ba390e66b7def469b84a21bfc648b2de3839b2eee4fb846bbf8bb6ba505f9d720ccb6bb1a723e78e8e8b59ab940ac26

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_hashlib.pyd

                                                                                                                                                                  Filesize

                                                                                                                                                                  64KB

                                                                                                                                                                  MD5

                                                                                                                                                                  a25bc2b21b555293554d7f611eaa75ea

                                                                                                                                                                  SHA1

                                                                                                                                                                  a0dfd4fcfae5b94d4471357f60569b0c18b30c17

                                                                                                                                                                  SHA256

                                                                                                                                                                  43acecdc00dd5f9a19b48ff251106c63c975c732b9a2a7b91714642f76be074d

                                                                                                                                                                  SHA512

                                                                                                                                                                  b39767c2757c65500fc4f4289cb3825333d43cb659e3b95af4347bd2a277a7f25d18359cedbdde9a020c7ab57b736548c739909867ce9de1dbd3f638f4737dc5

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_queue.pyd

                                                                                                                                                                  Filesize

                                                                                                                                                                  31KB

                                                                                                                                                                  MD5

                                                                                                                                                                  e1c6ff3c48d1ca755fb8a2ba700243b2

                                                                                                                                                                  SHA1

                                                                                                                                                                  2f2d4c0f429b8a7144d65b179beab2d760396bfb

                                                                                                                                                                  SHA256

                                                                                                                                                                  0a6acfd24dfbaa777460c6d003f71af473d5415607807973a382512f77d075fa

                                                                                                                                                                  SHA512

                                                                                                                                                                  55bfd1a848f2a70a7a55626fb84086689f867a79f09726c825522d8530f4e83708eb7caa7f7869155d3ae48f3b6aa583b556f3971a2f3412626ae76680e83ca1

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_socket.pyd

                                                                                                                                                                  Filesize

                                                                                                                                                                  81KB

                                                                                                                                                                  MD5

                                                                                                                                                                  69801d1a0809c52db984602ca2653541

                                                                                                                                                                  SHA1

                                                                                                                                                                  0f6e77086f049a7c12880829de051dcbe3d66764

                                                                                                                                                                  SHA256

                                                                                                                                                                  67aca001d36f2fce6d88dbf46863f60c0b291395b6777c22b642198f98184ba3

                                                                                                                                                                  SHA512

                                                                                                                                                                  5fce77dd567c046feb5a13baf55fdd8112798818d852dfecc752dac87680ce0b89edfbfbdab32404cf471b70453a33f33488d3104cd82f4e0b94290e83eae7bb

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_ssl.pyd

                                                                                                                                                                  Filesize

                                                                                                                                                                  174KB

                                                                                                                                                                  MD5

                                                                                                                                                                  90f080c53a2b7e23a5efd5fd3806f352

                                                                                                                                                                  SHA1

                                                                                                                                                                  e3b339533bc906688b4d885bdc29626fbb9df2fe

                                                                                                                                                                  SHA256

                                                                                                                                                                  fa5e6fe9545f83704f78316e27446a0026fbebb9c0c3c63faed73a12d89784d4

                                                                                                                                                                  SHA512

                                                                                                                                                                  4b9b8899052c1e34675985088d39fe7c95bfd1bbce6fd5cbac8b1e61eda2fbb253eef21f8a5362ea624e8b1696f1e46c366835025aabcb7aa66c1e6709aab58a

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_wmi.pyd

                                                                                                                                                                  Filesize

                                                                                                                                                                  36KB

                                                                                                                                                                  MD5

                                                                                                                                                                  827615eee937880862e2f26548b91e83

                                                                                                                                                                  SHA1

                                                                                                                                                                  186346b816a9de1ba69e51042faf36f47d768b6c

                                                                                                                                                                  SHA256

                                                                                                                                                                  73b7ee3156ef63d6eb7df9900ef3d200a276df61a70d08bd96f5906c39a3ac32

                                                                                                                                                                  SHA512

                                                                                                                                                                  45114caf2b4a7678e6b1e64d84b118fb3437232b4c0add345ddb6fbda87cebd7b5adad11899bdcd95ddfe83fdc3944a93674ca3d1b5f643a2963fbe709e44fb8

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\certifi\cacert.pem

                                                                                                                                                                  Filesize

                                                                                                                                                                  292KB

                                                                                                                                                                  MD5

                                                                                                                                                                  50ea156b773e8803f6c1fe712f746cba

                                                                                                                                                                  SHA1

                                                                                                                                                                  2c68212e96605210eddf740291862bdf59398aef

                                                                                                                                                                  SHA256

                                                                                                                                                                  94edeb66e91774fcae93a05650914e29096259a5c7e871a1f65d461ab5201b47

                                                                                                                                                                  SHA512

                                                                                                                                                                  01ed2e7177a99e6cb3fbef815321b6fa036ad14a3f93499f2cb5b0dae5b713fd2e6955aa05f6bda11d80e9e0275040005e5b7d616959b28efc62abb43a3238f0

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\charset_normalizer\md.pyd

                                                                                                                                                                  Filesize

                                                                                                                                                                  10KB

                                                                                                                                                                  MD5

                                                                                                                                                                  71d96f1dbfcd6f767d81f8254e572751

                                                                                                                                                                  SHA1

                                                                                                                                                                  e70b74430500ed5117547e0cd339d6e6f4613503

                                                                                                                                                                  SHA256

                                                                                                                                                                  611e1b4b9ed6788640f550771744d83e404432830bb8e3063f0b8ec3b98911af

                                                                                                                                                                  SHA512

                                                                                                                                                                  7b10e13b3723db0e826b7c7a52090de999626d5fa6c8f9b4630fdeef515a58c40660fa90589532a6d4377f003b3cb5b9851e276a0b3c83b9709e28e6a66a1d32

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\charset_normalizer\md__mypyc.pyd

                                                                                                                                                                  Filesize

                                                                                                                                                                  122KB

                                                                                                                                                                  MD5

                                                                                                                                                                  d8f690eae02332a6898e9c8b983c56dd

                                                                                                                                                                  SHA1

                                                                                                                                                                  112c1fe25e0d948f767e02f291801c0e4ae592f0

                                                                                                                                                                  SHA256

                                                                                                                                                                  c6bb8cad80b8d7847c52931f11d73ba64f78615218398b2c058f9b218ff21ca9

                                                                                                                                                                  SHA512

                                                                                                                                                                  e732f79f39ba9721cc59dbe8c4785ffd74df84ca00d13d72afa3f96b97b8c7adf4ea9344d79ee2a1c77d58ef28d3ddcc855f3cb13edda928c17b1158abcc5b4a

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\libcrypto-3.dll

                                                                                                                                                                  Filesize

                                                                                                                                                                  5.0MB

                                                                                                                                                                  MD5

                                                                                                                                                                  123ad0908c76ccba4789c084f7a6b8d0

                                                                                                                                                                  SHA1

                                                                                                                                                                  86de58289c8200ed8c1fc51d5f00e38e32c1aad5

                                                                                                                                                                  SHA256

                                                                                                                                                                  4e5d5d20d6d31e72ab341c81e97b89e514326c4c861b48638243bdf0918cfa43

                                                                                                                                                                  SHA512

                                                                                                                                                                  80fae0533ba9a2f5fa7806e86f0db8b6aab32620dde33b70a3596938b529f3822856de75bddb1b06721f8556ec139d784bc0bb9c8da0d391df2c20a80d33cb04

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\libffi-8.dll

                                                                                                                                                                  Filesize

                                                                                                                                                                  38KB

                                                                                                                                                                  MD5

                                                                                                                                                                  0f8e4992ca92baaf54cc0b43aaccce21

                                                                                                                                                                  SHA1

                                                                                                                                                                  c7300975df267b1d6adcbac0ac93fd7b1ab49bd2

                                                                                                                                                                  SHA256

                                                                                                                                                                  eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a

                                                                                                                                                                  SHA512

                                                                                                                                                                  6e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\libssl-3.dll

                                                                                                                                                                  Filesize

                                                                                                                                                                  774KB

                                                                                                                                                                  MD5

                                                                                                                                                                  4ff168aaa6a1d68e7957175c8513f3a2

                                                                                                                                                                  SHA1

                                                                                                                                                                  782f886709febc8c7cebcec4d92c66c4d5dbcf57

                                                                                                                                                                  SHA256

                                                                                                                                                                  2e4d35b681a172d3298caf7dc670451be7a8ba27c26446efc67470742497a950

                                                                                                                                                                  SHA512

                                                                                                                                                                  c372b759b8c7817f2cbb78eccc5a42fa80bdd8d549965bd925a97c3eebdce0335fbfec3995430064dead0f4db68ebb0134eb686a0be195630c49f84b468113e3

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\pywintypes312.dll

                                                                                                                                                                  Filesize

                                                                                                                                                                  133KB

                                                                                                                                                                  MD5

                                                                                                                                                                  da0e290ba30fe8cc1a44eeefcf090820

                                                                                                                                                                  SHA1

                                                                                                                                                                  d38fccd7d6f54aa73bd21f168289d7dce1a9d192

                                                                                                                                                                  SHA256

                                                                                                                                                                  2d1d60b996d1d5c56c24313d97e0fcda41a8bd6bf0299f6ea4eb4a1e25d490b7

                                                                                                                                                                  SHA512

                                                                                                                                                                  bc031d61e5772c60cbac282d05f76d81af1aa2a29a8602c2efa05fc0ce1079390999336237560b408e6539a77c732f5066c1590b7feaedb24baa9371783f2a8f

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\select.pyd

                                                                                                                                                                  Filesize

                                                                                                                                                                  30KB

                                                                                                                                                                  MD5

                                                                                                                                                                  7c14c7bc02e47d5c8158383cb7e14124

                                                                                                                                                                  SHA1

                                                                                                                                                                  5ee9e5968e7b5ce9e4c53a303dac9fc8faf98df3

                                                                                                                                                                  SHA256

                                                                                                                                                                  00bd8bb6dec8c291ec14c8ddfb2209d85f96db02c7a3c39903803384ff3a65e5

                                                                                                                                                                  SHA512

                                                                                                                                                                  af70cbdd882b923013cb47545633b1147ce45c547b8202d7555043cfa77c1deee8a51a2bc5f93db4e3b9cbf7818f625ca8e3b367bffc534e26d35f475351a77c

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\unicodedata.pyd

                                                                                                                                                                  Filesize

                                                                                                                                                                  1.1MB

                                                                                                                                                                  MD5

                                                                                                                                                                  a8ed52a66731e78b89d3c6c6889c485d

                                                                                                                                                                  SHA1

                                                                                                                                                                  781e5275695ace4a5c3ad4f2874b5e375b521638

                                                                                                                                                                  SHA256

                                                                                                                                                                  bf669344d1b1c607d10304be47d2a2fb572e043109181e2c5c1038485af0c3d7

                                                                                                                                                                  SHA512

                                                                                                                                                                  1c131911f120a4287ebf596c52de047309e3be6d99bc18555bd309a27e057cc895a018376aa134df1dc13569f47c97c1a6e8872acedfa06930bbf2b175af9017

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\win32api.pyd

                                                                                                                                                                  Filesize

                                                                                                                                                                  130KB

                                                                                                                                                                  MD5

                                                                                                                                                                  e9d8ab0e7867f5e0d40bd474a5ca288c

                                                                                                                                                                  SHA1

                                                                                                                                                                  e7bdf1664099c069ceea18c2922a8db049b4399a

                                                                                                                                                                  SHA256

                                                                                                                                                                  df724f6abd66a0549415abaa3fdf490680e6e0ce07584e964b8bfd01e187b487

                                                                                                                                                                  SHA512

                                                                                                                                                                  49b17e11d02ae99583f835b8ecf526cf1cf9ceab5d8fac0fbfaf45411ac43f0594f93780ae7f6cb3ebbc169a91e81dd57a37c48a8cd5e2653962ffbdcf9879bb

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\zstandard\backend_c.pyd

                                                                                                                                                                  Filesize

                                                                                                                                                                  508KB

                                                                                                                                                                  MD5

                                                                                                                                                                  0fc69d380fadbd787403e03a1539a24a

                                                                                                                                                                  SHA1

                                                                                                                                                                  77f067f6d50f1ec97dfed6fae31a9b801632ef17

                                                                                                                                                                  SHA256

                                                                                                                                                                  641e0b0fa75764812fff544c174f7c4838b57f6272eaae246eb7c483a0a35afc

                                                                                                                                                                  SHA512

                                                                                                                                                                  e63e200baf817717bdcde53ad664296a448123ffd055d477050b8c7efcab8e4403d525ea3c8181a609c00313f7b390edbb754f0a9278232ade7cfb685270aaf0

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Psrsoftdaoou

                                                                                                                                                                  Filesize

                                                                                                                                                                  40KB

                                                                                                                                                                  MD5

                                                                                                                                                                  ab893875d697a3145af5eed5309bee26

                                                                                                                                                                  SHA1

                                                                                                                                                                  c90116149196cbf74ffb453ecb3b12945372ebfa

                                                                                                                                                                  SHA256

                                                                                                                                                                  02b1c2234680617802901a77eae606ad02e4ddb4282ccbc60061eac5b2d90bba

                                                                                                                                                                  SHA512

                                                                                                                                                                  6b65c0a1956ce18df2d271205f53274d2905c803d059a0801bf8331ccaa28a1d4842d3585dd9c2b01502a4be6664bde2e965b15fcfec981e85eed37c595cd6bc

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\d00f7b7a-5f72-40cc-999c-36c48cd4fe6a.tmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  1B

                                                                                                                                                                  MD5

                                                                                                                                                                  5058f1af8388633f609cadb75a75dc9d

                                                                                                                                                                  SHA1

                                                                                                                                                                  3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                                                                                                                  SHA256

                                                                                                                                                                  cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                                                                                                                  SHA512

                                                                                                                                                                  0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\onefile_3232_133884812198182163\ZSoeRVBe.exe

                                                                                                                                                                  Filesize

                                                                                                                                                                  22.4MB

                                                                                                                                                                  MD5

                                                                                                                                                                  a5c226a8897030e93baec7ef14b73012

                                                                                                                                                                  SHA1

                                                                                                                                                                  f3e592fbd11ddd9de559824b7ac99875ff71e6b3

                                                                                                                                                                  SHA256

                                                                                                                                                                  b2613d8e0c580c24c43c686181421b865c9af866f64dd2234527358ba85f836a

                                                                                                                                                                  SHA512

                                                                                                                                                                  d3ef0424d3c4a0f37978e1e5e0a2f361016d027159775277500be6a31fcb986a650acfc26b9617762436abbd249e1f46e65053d2a7b14f94bf14becf7f95a5dc

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\onefile_3232_133884812198182163\_lzma.pyd

                                                                                                                                                                  Filesize

                                                                                                                                                                  156KB

                                                                                                                                                                  MD5

                                                                                                                                                                  9e94fac072a14ca9ed3f20292169e5b2

                                                                                                                                                                  SHA1

                                                                                                                                                                  1eeac19715ea32a65641d82a380b9fa624e3cf0d

                                                                                                                                                                  SHA256

                                                                                                                                                                  a46189c5bd0302029847fed934f481835cb8d06470ea3d6b97ada7d325218a9f

                                                                                                                                                                  SHA512

                                                                                                                                                                  b7b3d0f737dd3b88794f75a8a6614c6fb6b1a64398c6330a52a2680caf7e558038470f6f3fc024ce691f6f51a852c05f7f431ac2687f4525683ff09132a0decb

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\onefile_3232_133884812198182163\python312.dll

                                                                                                                                                                  Filesize

                                                                                                                                                                  6.6MB

                                                                                                                                                                  MD5

                                                                                                                                                                  166cc2f997cba5fc011820e6b46e8ea7

                                                                                                                                                                  SHA1

                                                                                                                                                                  d6179213afea084f02566ea190202c752286ca1f

                                                                                                                                                                  SHA256

                                                                                                                                                                  c045b57348c21f5f810bae60654ae39490846b487378e917595f1f95438f9546

                                                                                                                                                                  SHA512

                                                                                                                                                                  49d9d4df3d7ef5737e947a56e48505a2212e05fdbcd7b83d689639728639b7fd3be39506d7cfcb7563576ebee879fd305370fdb203909ed9b522b894dd87aacb

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\onefile_3232_133884812198182163\vcruntime140.dll

                                                                                                                                                                  Filesize

                                                                                                                                                                  116KB

                                                                                                                                                                  MD5

                                                                                                                                                                  be8dbe2dc77ebe7f88f910c61aec691a

                                                                                                                                                                  SHA1

                                                                                                                                                                  a19f08bb2b1c1de5bb61daf9f2304531321e0e40

                                                                                                                                                                  SHA256

                                                                                                                                                                  4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83

                                                                                                                                                                  SHA512

                                                                                                                                                                  0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655

                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\scoped_dir5200_1776166867\7975c31c-d455-4b58-a357-e60c99fbafae.tmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  152KB

                                                                                                                                                                  MD5

                                                                                                                                                                  dd9bf8448d3ddcfd067967f01e8bf6d7

                                                                                                                                                                  SHA1

                                                                                                                                                                  d7829475b2bd6a3baa8fabfaf39af57c6439b35e

                                                                                                                                                                  SHA256

                                                                                                                                                                  fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72

                                                                                                                                                                  SHA512

                                                                                                                                                                  65347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de

                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\Servicemon\steamerrorreporter.exe

                                                                                                                                                                  Filesize

                                                                                                                                                                  560KB

                                                                                                                                                                  MD5

                                                                                                                                                                  dc1681b98049f1df46dd10d7f4c26045

                                                                                                                                                                  SHA1

                                                                                                                                                                  4c7f5cf7c00b6139979f8aa41f46979666369224

                                                                                                                                                                  SHA256

                                                                                                                                                                  594f9853124e0a81deeaaecb8ec3d192169e7393778214ef6d8f6460450ef080

                                                                                                                                                                  SHA512

                                                                                                                                                                  c9a2086326acbab8aba801da0d8bd2aa06951ec7fd7f32a3150f9521498c0b6711552695fbf9d0de7668503630c508bcd68e1d715796ef34f9945035da3fe1ed

                                                                                                                                                                • memory/740-2171-0x0000000000250000-0x00000000006FD000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  4.7MB

                                                                                                                                                                • memory/740-2191-0x0000000000250000-0x00000000006FD000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  4.7MB

                                                                                                                                                                • memory/2992-2242-0x0000000000400000-0x00000000008B5000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  4.7MB

                                                                                                                                                                • memory/2992-2891-0x0000000000400000-0x00000000008B5000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  4.7MB

                                                                                                                                                                • memory/3232-189-0x00007FF7B54E0000-0x00007FF7B609C000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  11.7MB

                                                                                                                                                                • memory/3368-321-0x000002152AD00000-0x000002152AD08000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  32KB

                                                                                                                                                                • memory/3408-28-0x0000000000430000-0x00000000008DD000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  4.7MB

                                                                                                                                                                • memory/3408-15-0x0000000000430000-0x00000000008DD000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  4.7MB

                                                                                                                                                                • memory/3816-2413-0x0000000000400000-0x0000000000CDC000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  8.9MB

                                                                                                                                                                • memory/3816-2704-0x0000000000400000-0x0000000000CDC000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  8.9MB

                                                                                                                                                                • memory/4160-297-0x0000000003320000-0x00000000038B2000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  5.6MB

                                                                                                                                                                • memory/4204-3168-0x0000000000400000-0x0000000000E85000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  10.5MB

                                                                                                                                                                • memory/4204-3210-0x0000000000400000-0x0000000000E85000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  10.5MB

                                                                                                                                                                • memory/4452-2653-0x0000000006740000-0x00000000067D2000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  584KB

                                                                                                                                                                • memory/4452-1317-0x0000000000400000-0x0000000000432000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  200KB

                                                                                                                                                                • memory/4452-1320-0x00000000057E0000-0x000000000587C000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  624KB

                                                                                                                                                                • memory/4452-1557-0x0000000005D40000-0x0000000005DA6000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  408KB

                                                                                                                                                                • memory/4452-2655-0x0000000006D90000-0x0000000007334000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  5.6MB

                                                                                                                                                                • memory/4708-258-0x0000000003750000-0x0000000003CE2000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  5.6MB

                                                                                                                                                                • memory/4708-226-0x0000000003750000-0x0000000003CE2000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  5.6MB

                                                                                                                                                                • memory/4708-298-0x00000000049E0000-0x00000000049E1000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  4KB

                                                                                                                                                                • memory/4708-305-0x0000000003750000-0x0000000003CE2000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  5.6MB

                                                                                                                                                                • memory/4708-306-0x0000000003750000-0x0000000003CE2000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  5.6MB

                                                                                                                                                                • memory/4708-300-0x0000000003CF0000-0x0000000003E30000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  1.2MB

                                                                                                                                                                • memory/4708-220-0x0000000003750000-0x0000000003CE2000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  5.6MB

                                                                                                                                                                • memory/4708-217-0x0000000000400000-0x0000000000931000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  5.2MB

                                                                                                                                                                • memory/4708-296-0x0000000003750000-0x0000000003CE2000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  5.6MB

                                                                                                                                                                • memory/4708-215-0x0000000000400000-0x0000000000931000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  5.2MB

                                                                                                                                                                • memory/4708-214-0x0000000000400000-0x0000000000931000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  5.2MB

                                                                                                                                                                • memory/4708-222-0x000000006E600000-0x000000006E69D000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  628KB

                                                                                                                                                                • memory/4708-223-0x0000000003750000-0x0000000003CE2000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  5.6MB

                                                                                                                                                                • memory/4708-299-0x0000000003CF0000-0x0000000003E30000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  1.2MB

                                                                                                                                                                • memory/4708-33-0x0000000000110000-0x00000000005B1000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  4.6MB

                                                                                                                                                                • memory/4708-295-0x0000000003750000-0x0000000003CE2000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  5.6MB

                                                                                                                                                                • memory/4708-224-0x0000000003750000-0x0000000003CE2000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  5.6MB

                                                                                                                                                                • memory/4708-247-0x0000000003750000-0x0000000003CE2000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  5.6MB

                                                                                                                                                                • memory/4708-35-0x0000000000110000-0x00000000005B1000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  4.6MB

                                                                                                                                                                • memory/4708-267-0x0000000003750000-0x0000000003CE2000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  5.6MB

                                                                                                                                                                • memory/4708-264-0x0000000003CF0000-0x0000000003E30000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  1.2MB

                                                                                                                                                                • memory/4708-262-0x0000000003750000-0x0000000003CE2000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  5.6MB

                                                                                                                                                                • memory/4708-265-0x0000000003CF0000-0x0000000003E30000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  1.2MB

                                                                                                                                                                • memory/4708-263-0x0000000005D20000-0x0000000005D21000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  4KB

                                                                                                                                                                • memory/4708-261-0x0000000003750000-0x0000000003CE2000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  5.6MB

                                                                                                                                                                • memory/4708-221-0x0000000063280000-0x00000000634BE000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  2.2MB

                                                                                                                                                                • memory/4708-257-0x0000000003750000-0x0000000003CE2000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  5.6MB

                                                                                                                                                                • memory/4708-254-0x0000000005210000-0x0000000005211000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  4KB

                                                                                                                                                                • memory/4708-256-0x0000000003CF0000-0x0000000003E30000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  1.2MB

                                                                                                                                                                • memory/4708-255-0x0000000003CF0000-0x0000000003E30000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  1.2MB

                                                                                                                                                                • memory/4708-252-0x0000000003750000-0x0000000003CE2000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  5.6MB

                                                                                                                                                                • memory/4708-251-0x0000000003750000-0x0000000003CE2000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  5.6MB

                                                                                                                                                                • memory/4708-250-0x0000000003750000-0x0000000003CE2000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  5.6MB

                                                                                                                                                                • memory/4708-243-0x0000000003750000-0x0000000003CE2000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  5.6MB

                                                                                                                                                                • memory/4708-244-0x0000000003750000-0x0000000003CE2000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  5.6MB

                                                                                                                                                                • memory/4720-191-0x0000000000250000-0x00000000006FD000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  4.7MB

                                                                                                                                                                • memory/4720-188-0x0000000000250000-0x00000000006FD000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  4.7MB

                                                                                                                                                                • memory/4720-56-0x0000000000250000-0x00000000006FD000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  4.7MB

                                                                                                                                                                • memory/4720-249-0x0000000000250000-0x00000000006FD000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  4.7MB

                                                                                                                                                                • memory/4720-29-0x0000000000250000-0x00000000006FD000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  4.7MB

                                                                                                                                                                • memory/4720-57-0x0000000000250000-0x00000000006FD000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  4.7MB

                                                                                                                                                                • memory/4720-268-0x0000000000250000-0x00000000006FD000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  4.7MB

                                                                                                                                                                • memory/5216-288-0x0000022944C90000-0x0000022944C98000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  32KB

                                                                                                                                                                • memory/5564-212-0x00000197FA030000-0x00000197FA038000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  32KB

                                                                                                                                                                • memory/5564-204-0x00000197FA840000-0x00000197FB9D4000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  17.6MB

                                                                                                                                                                • memory/5832-235-0x0000029B91960000-0x0000029B91968000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  32KB

                                                                                                                                                                • memory/5956-240-0x0000000003180000-0x0000000003712000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  5.6MB

                                                                                                                                                                • memory/5984-248-0x0000000000250000-0x00000000006FD000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  4.7MB

                                                                                                                                                                • memory/5984-246-0x0000000000250000-0x00000000006FD000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  4.7MB

                                                                                                                                                                • memory/6120-190-0x00007FF621450000-0x00007FF622B05000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  22.7MB