Analysis

  • max time kernel
    103s
  • max time network
    147s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250410-en
  • resource tags

    arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    19/04/2025, 21:06

General

  • Target

    SecuriteInfo.com.Win32.Malware-gen.25058.13399.exe

  • Size

    3.4MB

  • MD5

    6ed6568f5678097a4a7e1d0877075819

  • SHA1

    6fd47e4ac5365ebf227166a2a1269ec48b60f135

  • SHA256

    befd287cf0e7ea186b496d2db1351ae25d279fa362babe0e0c0a00cb03287111

  • SHA512

    f7be525a6f7d3b2d6cebf4f862d93fac2bcd6ca1be9114d0c7c11b65b94bfdf293784f76f25adea2c21b71ff96e0ab8fcddd6227176a759434e4042c2214833c

  • SSDEEP

    49152:s/bgi7jBAFPnLbfDMmYcclPpi8XFkwITX8BKg7bVAhmQD8xDhJWbWCTwx0RtXffk:s7OLb7ZpAw8VpmLgXVAhdIYSzL/hMQeg

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 17 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 45 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3252
      • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Malware-gen.25058.13399.exe
        "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Malware-gen.25058.13399.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1828
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c copy Fi.mp4 Fi.mp4.bat & Fi.mp4.bat
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4580
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:2588
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "opssvc wrsa"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:896
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:4668
          • C:\Windows\SysWOW64\findstr.exe
            findstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3144
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c md 684722
            4⤵
            • System Location Discovery: System Language Discovery
            PID:4084
          • C:\Windows\SysWOW64\extrac32.exe
            extrac32 /Y /E Analyzed.mp4
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2204
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V "possibly" Regarding
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1296
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c copy /b 684722\Wars.com + Blogs + Loading + Mine + Extra + Road + Rendering + Holdings + Physicians + Guarantees 684722\Wars.com
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2088
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c copy /b ..\Cabin.mp4 + ..\Thought.mp4 + ..\Aspect.mp4 + ..\Nomination.mp4 + ..\Priority.mp4 + ..\Cindy.mp4 + ..\Rosa.mp4 + ..\Account.mp4 + ..\Picks.mp4 + ..\Ministry.mp4 + ..\Levitra.mp4 + ..\Suspect.mp4 + ..\Sk.mp4 + ..\Mobility.mp4 + ..\Elevation.mp4 + ..\Dr.mp4 + ..\Cest.mp4 + ..\Henry.mp4 + ..\Patterns.mp4 + ..\Thumbnails.mp4 + ..\Newark.mp4 + ..\Mud.mp4 + ..\Announced.mp4 + ..\Shapes.mp4 + ..\Minolta.mp4 + ..\It.mp4 + ..\Canadian.mp4 + ..\Pubs.mp4 + ..\Fundamentals.mp4 + ..\Costa.mp4 + ..\Predictions.mp4 + ..\Officer.mp4 + ..\Cached.mp4 + ..\Baltimore.mp4 + ..\Strike.mp4 + ..\Chancellor.mp4 + ..\Usually.mp4 + ..\Shelter.mp4 + ..\Sticks.mp4 O
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2276
          • C:\Users\Admin\AppData\Local\Temp\684722\Wars.com
            Wars.com O
            4⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:3424
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks.exe /create /tn "EchoSphere" /tr "wscript //B 'C:\Users\Admin\AppData\Local\SonicSpace Innovations\EchoSphere.js'" /sc onlogon /F /RL HIGHEST
              5⤵
              • System Location Discovery: System Language Discovery
              • Scheduled Task/Job: Scheduled Task
              PID:2500
            • C:\Users\Admin\AppData\Local\Temp\684722\RegAsm.exe
              C:\Users\Admin\AppData\Local\Temp\684722\RegAsm.exe
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:5112
          • C:\Windows\SysWOW64\choice.exe
            choice /d y /t 15
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2576
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c schtasks.exe /create /tn "Watt" /tr "wscript //B 'C:\Users\Admin\AppData\Local\SonicSpace Innovations\EchoSphere.js'" /sc daily /mo 1 /ri 3 /du 23:57 /F /RL HIGHEST
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2636
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /create /tn "Watt" /tr "wscript //B 'C:\Users\Admin\AppData\Local\SonicSpace Innovations\EchoSphere.js'" /sc daily /mo 1 /ri 3 /du 23:57 /F /RL HIGHEST
          3⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:4912

    Network

    MITRE ATT&CK Enterprise v16

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\684722\O

      Filesize

      2.8MB

      MD5

      c4a680b7f7d384dd8ba5bff4b32c03e2

      SHA1

      39ebbaac14833a6dbfd2b8768bb1dac4b42901fa

      SHA256

      a69fede941d0e0936acc7e0dfd107a5941aff9e78bc05223df93ae987f9d9051

      SHA512

      00c4d2b51cdaaba911ff757920678ab1a237d81dc1127469d69580c5b6b77274bbcdbd2bd3cdaa8658b56d632d66322bb9a5eb758d6501158419bc9fb85de016

    • C:\Users\Admin\AppData\Local\Temp\684722\RegAsm.exe

      Filesize

      63KB

      MD5

      42ab6e035df99a43dbb879c86b620b91

      SHA1

      c6e116569d17d8142dbb217b1f8bfa95bc148c38

      SHA256

      53195987d396986ebcb20425ac130e78ad308fdbd918f33f3fd92b99abda314b

      SHA512

      2e79de2d394ad33023d71611bb728b254aa4680b5a3a1ef5282b1155ddfaa2f3585c840a6700dfe0d1a276dac801298431f0187086d2e8f96b22f6c808fb97e5

    • C:\Users\Admin\AppData\Local\Temp\684722\Wars.com

      Filesize

      514B

      MD5

      419991a1fb961fcbdfa40bd3f0e2838a

      SHA1

      f88525ae16abcdda602c3d7e5e93bb543e1de8b8

      SHA256

      ca551c6144b286e2ea14cfe288f592cc5f5e42b8d64882d13acac8e044f79cfb

      SHA512

      b5b6f69d2969d7e48863b4b04fb67c7d0aeefc6f4e07abd08bfacf985df18a364e329d0d58ac105b7b4d0e4043e461af7eb2f75dd8ff679ceae18b7b8d0df3bd

    • C:\Users\Admin\AppData\Local\Temp\684722\Wars.com

      Filesize

      925KB

      MD5

      62d09f076e6e0240548c2f837536a46a

      SHA1

      26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

      SHA256

      1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

      SHA512

      32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

    • C:\Users\Admin\AppData\Local\Temp\Account.mp4

      Filesize

      67KB

      MD5

      00116412fdf8464c26df9b7f2ed82ba9

      SHA1

      ed9fa154e256d1351cf0fcc3f2d0e5d1782b73aa

      SHA256

      279260f7d38a5e7685663191a678149e95622b1961287c91c076b98d06aa3638

      SHA512

      8067aa9c8dd7da0d5f63f6d4626fff35884b3a4d33ca38c9b926d3d0d10e7efe2e956c2d54ffcb8a6bdf8e1b1934671de6fd1cd0c3e4fddeb415667ca026d7b6

    • C:\Users\Admin\AppData\Local\Temp\Analyzed.mp4

      Filesize

      475KB

      MD5

      7c2ee42649a80ff2a8b787ba2de32bd2

      SHA1

      6b027008854e0464b677533b6f913d44291ae340

      SHA256

      8c3a2505de4568b60cb48f0bef35e0c0c3ac7f36172db29f8ea2b26aae34ec8c

      SHA512

      79f07bacb8ab7e7f1dc7841ebeb8c7bfb2409943d7775afdaaae94365aaae103dd19ffe9ca6c066036bc8f4dc8f3b72a14e96af83cad5cfbd4160dc1c78ce5ba

    • C:\Users\Admin\AppData\Local\Temp\Announced.mp4

      Filesize

      90KB

      MD5

      9c6fe73d8149cad938ab0d07ccb89bd7

      SHA1

      142e7a45f4cb2bb4b9347b9a808258428cc112e9

      SHA256

      13ab8151ce306f33cb43dddbdcd321155acc4ca63e49fe5d07c7cfe6fad8608e

      SHA512

      4c34f326abf1c0936233fe2aaa38cd0a51a28e537c587e473aa0f533e0fd5300778f2be2b413ad575f384eac2c757cc64944d9e4902ac8023b73609d994c618f

    • C:\Users\Admin\AppData\Local\Temp\Aspect.mp4

      Filesize

      82KB

      MD5

      0f3cfcd0f27455db6fe5237d484abce7

      SHA1

      3fc7936394d49e22e3d7870fed37242127585f9c

      SHA256

      579b9b7c95130b1828d568756a356f092139e9f306f0edce7a68ede1f278213e

      SHA512

      2997dc48cd4a27df6692039a18c3f2a4d300ccc1b4ac8e180edce936957cea3510f218615cbd3eed4232d89d0139261fd91a93bec24afb21583e6e1caa642732

    • C:\Users\Admin\AppData\Local\Temp\Baltimore.mp4

      Filesize

      78KB

      MD5

      3fce9dad0b63da35e2600422972a5005

      SHA1

      913673eb83809c7071ff566411cccfa1508e0b13

      SHA256

      80f6da4739ac886be6851bf3412049ba04bcf403e389df7f3bea8ab1c8add5b3

      SHA512

      45847f36bbddc6581ce2adf1913844a5c67dc9295a5f595df65103884fad67fb48ff3d3904c726462a5d61574af6de7484af95afbbf816a29b80e3f945a87856

    • C:\Users\Admin\AppData\Local\Temp\Blogs

      Filesize

      90KB

      MD5

      f3e829fcfee9a14885d599f98c7cbe07

      SHA1

      528bd49fbb6c451da578edf75d7e7c60a636252b

      SHA256

      55db47a4698fe79abee6d1faa4ca43a42a8e18056e7edc9b215c98f7e0f512e1

      SHA512

      fa5783abe09b0984e5c1737892babf40fc405c8263317503dc2fc5babf3a49d9fd16a088aa40cd586f919c8fb9a043e0b3dac0270065dab1834439148a1342d8

    • C:\Users\Admin\AppData\Local\Temp\Cabin.mp4

      Filesize

      76KB

      MD5

      10eed8f15d492d519acfd589ccaad34b

      SHA1

      caf763863dd24d7e2ac7b687defd8dae49dac497

      SHA256

      4333ce38cde981a1427cfa16a37ffaf8a42af4670acb967b1118f461d9aeeece

      SHA512

      4b83016a88ccf1df14f2b8c7612779a9a52f3e5f82be164479ee8f5c48ecb3deff26e285e486608ecd1ecc6297c342b4669df303229a591bed1c7482474a0f2c

    • C:\Users\Admin\AppData\Local\Temp\Cached.mp4

      Filesize

      50KB

      MD5

      2106c44246086bc5d711ae8457fa70f4

      SHA1

      c7dc11a1162cb5965f1b1f6ea8f7e2646bf428e7

      SHA256

      b5283c7230cebe4413f04bc63df7c7385b5d2207d9a2085f546616eaa8b0337e

      SHA512

      f42dcf45e61fe835e86a703dd69f5db9ac89a6fbbbb0f7fd3dbe3484289992fb91ef369fa25561ac1f8b10e254f2b4612e869874e9b9abeeb06ad35ab904dbe9

    • C:\Users\Admin\AppData\Local\Temp\Canadian.mp4

      Filesize

      77KB

      MD5

      576f15a9f51254d20e580a8528f10b3b

      SHA1

      95289c4a17458e9d5e09dd3cb0ba1e1c65e3b446

      SHA256

      d43c66cd423b164c90a27f699abe320ad253906dd7a9d63fa962e7ccc80320d9

      SHA512

      b8118a02f064512464ddce09a7e908933a42531be72ebd8d5530ef551de409237da107920cd32186ff83faff315c4cb18e47b7fc358501ed7bed5a59e336309a

    • C:\Users\Admin\AppData\Local\Temp\Cest.mp4

      Filesize

      51KB

      MD5

      6399c4c4345cd86737ba23e4e76c1e0d

      SHA1

      5995d2cd0d29baeee13bb5d46bf768244ef4a001

      SHA256

      cb5e753aaf1d989b6b64176e8225f0c311bda0d6aaa6850f4af2c94d4e2590c4

      SHA512

      bd325235df5734a7549207bc0211161621cecebd4ba25e3f5b0fa9abad92f164a16a3fab500c0c9aee0fd83a4cdfaa6ec835d5c6b17a15b2a3e5e35245beee97

    • C:\Users\Admin\AppData\Local\Temp\Chancellor.mp4

      Filesize

      78KB

      MD5

      533190f371feb370369c37f37ce6f6c4

      SHA1

      8cfb7948012a741ef02bfc2ef3e8ace03977d9d0

      SHA256

      9cde9bfb12337ab204e951813a6849a7ac541adf5803ade7c76d03a7c09809ff

      SHA512

      81dc86bea825d3142c0e23a77a20210344c23b826956db0c4c89853355ff054ab68559e11131c30cd0a6b6e9f3d64c417d2d2e0cdd87523a4d0222130713239e

    • C:\Users\Admin\AppData\Local\Temp\Cindy.mp4

      Filesize

      87KB

      MD5

      75107010d115fff916ccc5ba449b969a

      SHA1

      f1637fb9e3954b5a47cd95190e21814b282cbc53

      SHA256

      6e77dcdce7cb5d4e599b51df1264eb0c1ab29bb5b778828a8443ca4d27577c52

      SHA512

      9c358d319ab2af353ccd498584e6e75e6898e2a61f54a6207a4a5c7f395ee0e188839125deb98460503498cd67e63c386d3189417ce23b0f8090ed9e0b0e4c20

    • C:\Users\Admin\AppData\Local\Temp\Costa.mp4

      Filesize

      92KB

      MD5

      1a6353a4dca96d8d783d8865761a6fcd

      SHA1

      2c3eea4f19367aa751d1bf9c2ed80dace986c8bb

      SHA256

      8524da3d84d8b514d8f4d2491f60a974b4128394bf4865c56ec974b26f872e04

      SHA512

      e6b3f845fb96a20456f16768729786d3ad85f6818ab7e081280644ce511e5c2b223afdc2019d65d508e14da2e672bb5581da2a3dadb9363f6857ac77d012488a

    • C:\Users\Admin\AppData\Local\Temp\Dr.mp4

      Filesize

      57KB

      MD5

      610436175c0a4bdf80defad5dd08e1d5

      SHA1

      e6900c03a13f8ab2f03388f0a606272501b7afb8

      SHA256

      2dfa0734c5eec9eb12cc73dcd9477287daf6e52461b7c34597ffdb4dfb02c42c

      SHA512

      68bad47a0b2379edbd68e53e24de13a6ae8588cb671b0aa0d30f049dfce865e7a064da579ee9d90cec6d59666f2d36016facc9ec075082d9f3d97a1338b90e48

    • C:\Users\Admin\AppData\Local\Temp\Elevation.mp4

      Filesize

      57KB

      MD5

      65237c7971a4392ec36e91950cbd7a8b

      SHA1

      7068828d70a874b35bd12ae81f60953057432830

      SHA256

      c4e458c4e7d8185a4a36d14401b77891e14e69b99a893b00ee233396770ffb52

      SHA512

      c7a861edc5391838131d252b5ab092d664ca3acc350b89eddc8d583224c5717a099c8adfad3a5e8ea9aaf47653db8099f2663355193b04b4bbd599e103d983b0

    • C:\Users\Admin\AppData\Local\Temp\Extra

      Filesize

      91KB

      MD5

      9909ddbb4bb8aefd70eab2040da229d9

      SHA1

      d741649475b124bcd7887e48bad490b9b965e7ff

      SHA256

      900a688537b6bf32f7e2f7489b0051a30a6f9d13108563c5af8adadb68dba67a

      SHA512

      9a9ce0c3b7fe55537179bde195528a2e0a898779e58a1a509bb8238f6f1d56cd42d2784fe62057ae379f028162d22086475cf09c3e11d53481e4506beb436eb9

    • C:\Users\Admin\AppData\Local\Temp\Fi.mp4

      Filesize

      33KB

      MD5

      318bd186b81886f661d98e998d422222

      SHA1

      b04751dcb2ae16f225fa080f4be0648bc198b422

      SHA256

      083fe85a0f29a4a77372d6cd5bb21a99f92bfe7c74e8b0439b639e715e8629ba

      SHA512

      b00c7a9caa71986a7255231bb80d4a1b0d504a95617e7366c034e98bfef99915208668498ce542223e39f5b0202ce316dee94ef4f31ddade7bc01f66f86615d4

    • C:\Users\Admin\AppData\Local\Temp\Fundamentals.mp4

      Filesize

      76KB

      MD5

      614b821fac497acee20edd40b3ada11b

      SHA1

      55b1994ef23de9b7322dc950aae0903ed6d169bf

      SHA256

      33e37e78b71ed80db8af08405bdf7032b40e26cad330aeae916477e8e270fa51

      SHA512

      10fecba182864e3f08a5be498fa17840bfbeeb4c734a42a98ecf671cafea853ebd25a7c5e607f53ae19114821adb1990d0787e06f5ca98f2a0e129e7f7539bd4

    • C:\Users\Admin\AppData\Local\Temp\Guarantees

      Filesize

      66KB

      MD5

      70d97eca72f1af9027a1aa8e99a94476

      SHA1

      acd27e92c733925fa272a56028d084eaf407eadb

      SHA256

      966658026226c5cc082293abad35ba217436ecb475faf3f09584e650ec45ceba

      SHA512

      ac0f903833cb7a720b4b9874981f1ed3bf2804450ef0fe9a867606cfd3dd5b099dd3dbca312e5b7f4c7cd77857dbb18cb9da9c5c035c902d360026954094f1d8

    • C:\Users\Admin\AppData\Local\Temp\Henry.mp4

      Filesize

      55KB

      MD5

      3152efa2b300c0d1aa8fcea8f2c8eb78

      SHA1

      b14af0f8b5b3efd0a0bf929bef72f4e254ee2428

      SHA256

      48ad17db5fe73e995ed15b4a845f2dab3a3fdf29e6622ae7792abb479b3994b0

      SHA512

      537e33984c5ff7d9110699c3fecb20123ab227f7ea12b32bbe5e8be16bea51d945ef14267b35c1218db3f2eb536c02380c9d2cb9be387eb17ae7f581abfba3de

    • C:\Users\Admin\AppData\Local\Temp\Holdings

      Filesize

      135KB

      MD5

      c301d816a28b5e67b4e9f9bf704c1762

      SHA1

      83cbb0a833ae2074632bbfbcf1d326b99fbef1e1

      SHA256

      0e40f3e8bc848349f2ccca86ef3916b9d6a9762e2fae57654e69fd6eefd4fa5b

      SHA512

      c27af1dd2d26721d27162989f6f8641627f04ca9b8b77dafaac808f7f31b10187fe2f0583c0b9538ed9a8cf65d849173345f0ee066fb6be342f87a89ee0270b0

    • C:\Users\Admin\AppData\Local\Temp\It.mp4

      Filesize

      92KB

      MD5

      e115fe6d30bfb278cd04b2cb4b945e5d

      SHA1

      b324ec45a42dc1bb6267894ef98967c3d12fa6cf

      SHA256

      ea3fd44cbb15b2cd83494db940d6a5a4c0b607cbcc4f724f28faf0f47aea9616

      SHA512

      3154f5cc5f67d631b1fcb7db6f405a3ca18a46b04b258ead77947e62131288f8f8b4fa8ef5297ca0bcf5f52b58d1d430986dd4e785627ed4e4d1534a5bda3d79

    • C:\Users\Admin\AppData\Local\Temp\Levitra.mp4

      Filesize

      54KB

      MD5

      a2ea735c3c3b913bc0e81a3f64692e47

      SHA1

      14387d221c256939bee1e516bef4cf70d400b833

      SHA256

      b58bb3636a5e438c05666fe4c8e62b2bd9b602034cd91808093ee7ad17ed5e9a

      SHA512

      ca2e63fdd75a7181cdfdd279f62201f4039a88eb5027a244dd1b6dd8787cd25dd51d4aaa3232128e9fbb2c99330017212173affec566c84fc9e04fcc96bdb4b5

    • C:\Users\Admin\AppData\Local\Temp\Loading

      Filesize

      94KB

      MD5

      c879816722f0eb34b4d96c10bc6ce68c

      SHA1

      9adb75ca6f1ed7c0bfcee53f09c7d84463d5b0e8

      SHA256

      c6b8dc986a769d8f66432f7d0ff1f9c38b32a2232a7060f65ea6845bf26c2cca

      SHA512

      14fa25a85f0747d3ed930ffab387bdd607195cdf03a7a907bdf2e3bd453da78f41163ffdd20a9eb54023141023462a7449f261dd602e9483c1e86c781cef0a9e

    • C:\Users\Admin\AppData\Local\Temp\Mine

      Filesize

      139KB

      MD5

      27e070bb25b3828b1166c755ea841c65

      SHA1

      f3b4a5c8d2f57b6ef4aaff2b07aef74411f9cf15

      SHA256

      49f30efd2c7ac5546bdbab815c27dbf0ed747324bb4ce8881e3666b77b71e502

      SHA512

      2dd4635b15fc8a9fc17dc57c5a2707ef557f8663254af40a620976ff1640c9563191912750e0c9dc5d7bd0cdba3d84c50ec437999e049e9e6c37ba2a4033e9cf

    • C:\Users\Admin\AppData\Local\Temp\Ministry.mp4

      Filesize

      55KB

      MD5

      cad60e5485ba5f445f2db3067fa8daab

      SHA1

      58f8a81d8e2d883ccfd1c93d808dbd1b67a164bf

      SHA256

      cbeef288282c9d410e8ae540045c66481f062c2aef3d22bc42011cb6b0d7ee96

      SHA512

      92fa2204fd7f35c1f79e1d253374df4127b79484b103436ea8c7f4e6e2f80573bea4cbdeebc57580fa24737a75ab1c540c796165c696ff2c8cdbe6c76584bad0

    • C:\Users\Admin\AppData\Local\Temp\Minolta.mp4

      Filesize

      58KB

      MD5

      c1981215e3082ace0063507679dba2e9

      SHA1

      4bc998b8cb0fed40240bab1d63f2fc4d57366a2a

      SHA256

      7ad9b803fcd9bc2bf06fc2e63aacd31c7788f3e0dbfca9924e89a1792ea5973a

      SHA512

      c18fb9f543b7e6e24d6d9aca052e84676c022eeb35c219aa7a5f3e12d83ba941c0c300ef1bfd095a354bb612c2c95b4c750fe25f797e028fb88e879399aa958d

    • C:\Users\Admin\AppData\Local\Temp\Mobility.mp4

      Filesize

      95KB

      MD5

      12773e2b4204d0c93ba7da4c31c7ef51

      SHA1

      73991b2fb244bc70982f54cf8a88944fa0dd876f

      SHA256

      567df6d15b8ca896652f8e5997c86164e050f9e1771f51675016b995923b8286

      SHA512

      958103efe85f79837ef74a1e9409bb3332d22c0e25a40888d9d031e332e682967028dd82e91c22f5b9d0d3acb0dee6459678a0292dab6b45a64027366189ff2e

    • C:\Users\Admin\AppData\Local\Temp\Mud.mp4

      Filesize

      61KB

      MD5

      5b1bdaf42cc521a7429d4dc0b2000e14

      SHA1

      4c8f9e596f6e2a05cb4ecd566971bf847e687cfe

      SHA256

      a324ab9e0d1abe79908c22ca5d36c149e17fd0db071528c587e1626cdb8c46a3

      SHA512

      7cfb6d94b005912b04c04b10628a72900019bdd5c827bafb7c230a530f50b80857f81eac0149e770fb0288292adb618b370dad6f132310a62a66b8a6a137bd61

    • C:\Users\Admin\AppData\Local\Temp\Newark.mp4

      Filesize

      63KB

      MD5

      5d9c2cf7bd95a400973e400a790ada6c

      SHA1

      7e1672ff33d7ad6cdaa896725d9ab28f8102a056

      SHA256

      72060ea7d8876c1b8b8b70b67d2e356d288e3cc0a70ff4559479454b276c7c97

      SHA512

      004ddabcc2ebe308281dc104db56b8992cda126acf6c0d9392e0ecf182038dde277a0d2f17869cd1b1dbe9b0db69d3d075d2dbbacb5ed27943a88f8031c01011

    • C:\Users\Admin\AppData\Local\Temp\Nomination.mp4

      Filesize

      73KB

      MD5

      926c1eea907493e88d3c1cd4b2101490

      SHA1

      c31b3da9f524f0f6f13af6d218b40f517da16dff

      SHA256

      ab4c37d99af48cfec0a5d5cee6326494fe5b9e7e518bc85dccd2bd23b715fe83

      SHA512

      7f9efd69a22b5ef9f80dbadf63f00a8b6aabfd31ad13691ae958147af46c847a680071487d24a7ce4d79d8922fe18a62de0ac17e71b6dc3987702f5e2609e96e

    • C:\Users\Admin\AppData\Local\Temp\Officer.mp4

      Filesize

      59KB

      MD5

      c0a1012c6802a0b5437d53e3203001ee

      SHA1

      fb29d03d6dd3df2d993e510bb50928d4627d23bc

      SHA256

      071fe0e0b29542bbe26213f0181a9f98347ce6725fe77422d2caf673fbc1d178

      SHA512

      b09c3713a49abb01e4fc4ff3e5d15c70fd675da67703ad631f734c5a200c2155ac6e5de67654b13223ca71f3a8f7e5f04f53aea5ef699df747a11f1e5a6eb9f7

    • C:\Users\Admin\AppData\Local\Temp\Patterns.mp4

      Filesize

      93KB

      MD5

      31bc05c18f81113437f838501c7c530d

      SHA1

      5a364a50c926fa4d6831c28adba8cda4e10ca7f8

      SHA256

      223e0fabc0185c08720a1fe8284250b514bebf11d6ed4f80615e718ff2f19d7d

      SHA512

      60cc73ec4307b8419f9c262a92b5bf3f3ca0ff622779d03520aadc8b83d3681afaa75d7f797157c83b1e83e8545a766e22c9279295c50d512faa75f86011b7c0

    • C:\Users\Admin\AppData\Local\Temp\Physicians

      Filesize

      82KB

      MD5

      e77e67ec34cd71eba6331b1a188b49ff

      SHA1

      5f942d8c1ed83952fa153b9b10d8a99b6639828e

      SHA256

      00533aae0e5e2640d9347048db27fbd4e8a9151f1051d73488cfe3b5b44d1022

      SHA512

      34552f13b46a57c9adc09d30348c291d162093f7beb624db556969ebe601546741198366ff8ba14533f978d3c930af6d1004ee16e837f8c5c539c0c830d2a3e7

    • C:\Users\Admin\AppData\Local\Temp\Picks.mp4

      Filesize

      76KB

      MD5

      ae47f77df1c5389bd1bb7538b49e9444

      SHA1

      1869b5b20881dfd73c94162cf53a20515f8e6631

      SHA256

      6310ec6562e0b8f88e9b53cd966ef2b150586770230551622aa24b544ebcaa20

      SHA512

      88e7540560e7e7995f7e126838e8095be16a7e91589bf3e8729a35a76eca91de2ea8aeab0a0a4ae298e00d1ca43a9e70ba1ff8d27e6059f01f63881b1398c51b

    • C:\Users\Admin\AppData\Local\Temp\Predictions.mp4

      Filesize

      66KB

      MD5

      dd6991cbb7c88f526cf04f6c80d83dc4

      SHA1

      8af1d4ba6b352f63b41c8ad9309fd7daea743e10

      SHA256

      f3684a8ef81fbe44a4f907279f77ed2726439d18a8a48fd304c0585da85ac8e4

      SHA512

      a47dd1549004c60955cbbdbbb63dbcf83c5cc18d3e21c50e7edf65f20e5e4d70390bba26d303287f463d86f631ce74dadd9edc0258189ab42f0ba57371adb6df

    • C:\Users\Admin\AppData\Local\Temp\Priority.mp4

      Filesize

      87KB

      MD5

      fb0a506c6828b2d0ce60e3a884546e3b

      SHA1

      abd3169cf94a1d23ac475e4b3c5460a08075da77

      SHA256

      a01cf9041d03c294a99a8159d684e7c4cb47cf66fc28bf4163343bb20d0ddaf7

      SHA512

      0f0fdc02ed2ca7732492d835ac36c0478887b5110dfafb5ae21eef86334ccbdaa1d02cd3d6912a0de7e66840a8e169f44bb64ef9c7d0d313e9cc854abba3cd0e

    • C:\Users\Admin\AppData\Local\Temp\Pubs.mp4

      Filesize

      53KB

      MD5

      530adcab55e361f000f3e541867bb0ff

      SHA1

      2711de61acd084ed3655d12c30ea2a220a6c2686

      SHA256

      46c13708315509c57e1abec605cf8bbac05460112cef1817da3646921b812636

      SHA512

      a6f1ec6e0a85edc478732726d6cdd056246408bccfaac550b59a6de625c66a48aad23b9c628a982ba994601d73900bf1f6388ad92030bf030b84d450e6a475ee

    • C:\Users\Admin\AppData\Local\Temp\Regarding

      Filesize

      522B

      MD5

      124f828e8a812707e5b4d285334580ae

      SHA1

      974160265f8b9679dfbec52248b852db716c84c6

      SHA256

      d524adcf4b88b676de24e4409a53ad97719c925affce770b3b582266b44aa036

      SHA512

      9b805554240531be8af350fc06cf284cf242227c157155934b9ffc2b475577c4e62d76bd402eb9c3fbe546e763547ca1f3699ce3b354d30cd7e2cb6f01723f98

    • C:\Users\Admin\AppData\Local\Temp\Rendering

      Filesize

      130KB

      MD5

      9996b4f3ecb900c2b57f077fdb83d098

      SHA1

      b45461012ff67b9d5386eae2b1969f6076d068d6

      SHA256

      f061b9c175cbc061f945aacf3776385f7bc723deecb793a5499721858df2ce7d

      SHA512

      39c05013b9baf78b3300a96cb1307ad4e92baa4c2323c4dd9d5027d15524ce3ffd521419335b6ab7a05c10f6c12b406226ed6a2354c2a56e05b1eba31163d37a

    • C:\Users\Admin\AppData\Local\Temp\Road

      Filesize

      97KB

      MD5

      235b51be94b136825be12398da86496f

      SHA1

      8a888cba36bb89f64420ec93ac31ff4cc1012e44

      SHA256

      8fbf900f6ffff2988840a2f7cf9388273e621b6847a3a209460eed6d44826427

      SHA512

      b83a512e1322e2b08827e34060514b10ade7ab0a547766fd774f82c7a7fb165f894db3115cf7dbd3dd634873a3f7a9e04eb4f10fa64bc958d059f9c41dc9544f

    • C:\Users\Admin\AppData\Local\Temp\Rosa.mp4

      Filesize

      97KB

      MD5

      0d1123fae3f82143266454c1e3c204fd

      SHA1

      e6f4398af367d3a60cb87812e2498410a2039e94

      SHA256

      ce80cfcce1003de6df4427688a96971d9007856877270d033704253c7ae38f83

      SHA512

      95304ff8c04dceeb9353c9293530608af22fe64a94eab3547cfc7a34a4079c99436b78ba6657c4d876efd66f4af78323a0bafe689aa1a2c54ab92bdf8fdd7efd

    • C:\Users\Admin\AppData\Local\Temp\Shapes.mp4

      Filesize

      66KB

      MD5

      dabe462c17bf6b7304b77e2b848b713f

      SHA1

      49897803d2a54b0a69a2da294cb988da38246476

      SHA256

      f8637fbb82b299288e6b62a1a5b9bd21b4a9a785ade096427d679856a98cac5b

      SHA512

      4c8d8a211c33391262e829765a3b815f8d6fafa3c48311ebf6b9274929b22f154337dc789685c98fa9e02c0d115d16944006abeb0651c0ba4888248bd00bc89f

    • C:\Users\Admin\AppData\Local\Temp\Shelter.mp4

      Filesize

      71KB

      MD5

      6c9e80b7abdfa985962a69958d1e5f66

      SHA1

      e4f94a0ed52b2ecbf1db6ea855379d0787b81bc0

      SHA256

      6b71a75f2e74ed95e741ef38423c611ca8fc239740346d658ef040a4ddce6c90

      SHA512

      d4e8623fea9a58078c74cfd64b5c44202e5b0c10eeb4a365bd86188a9efb2798615063e4791ecfddec4cf5ce0594d49ba1a8d408a157eec70e5ebd7c73e1b56f

    • C:\Users\Admin\AppData\Local\Temp\Sk.mp4

      Filesize

      69KB

      MD5

      74620d04fdef8281e7e6ec7ee6a35690

      SHA1

      1fd00b48c166f48b936d9ac3ccb734a6da8592d4

      SHA256

      75c0b3109f369ede42de31e8656a38d50d6d843e8d58082cec692c5473ab4df2

      SHA512

      760b5b4a3b5847e6cbdbdc349e3c3d74287af7b005013e0f79d4c8256dd952c1305a226388f6c836fe3cd88d90feb8d88e6f8e9ca4c2c97e73627e835d3d4fa4

    • C:\Users\Admin\AppData\Local\Temp\Sticks.mp4

      Filesize

      32KB

      MD5

      a647a43786f02becf914eab657c4cb80

      SHA1

      067927efd7d7e32f1e1105f860a89a00ca16a625

      SHA256

      3deb6069aea77bc14189da43dab792a257f2cfa3ddc13fc4594530a6e938a8d6

      SHA512

      8839392303ade9431d9726ff14c6e5a7fe44f8766b50955008065ea68fd65b20a760b0fed6c00594c7dc113c8b6939c04ba58eb050a58ea39a934fcba79367a2

    • C:\Users\Admin\AppData\Local\Temp\Strike.mp4

      Filesize

      60KB

      MD5

      eac56ce2a3fb33e0f84d497a4965638e

      SHA1

      51f2f328131c99073717ff9c6707215b63be1c15

      SHA256

      4baa4387ad128b35b71c48d62aa91ed555a65f315a959423c3a95c81bd459fc1

      SHA512

      4f2d3b65ef054898c139f79f413619111b9ba6cd862cb47298ee8f35ebc4ec74dbb6ba5093debdb2be2439b02550c3c99a510a66f2a0b3e4041daa8b8c4b558d

    • C:\Users\Admin\AppData\Local\Temp\Suspect.mp4

      Filesize

      98KB

      MD5

      a2b1fcff0d448073d4c19075c8e966bb

      SHA1

      509f79f06024bd5ddb20142995a1e3d3274ce510

      SHA256

      a2be4617f3d81b84fd04e4e3ad4e47471b4ce881ac67bb8273423381db01c499

      SHA512

      96dc557fa6bcceef97f399c125183a4873a9beecfe1f55c980d402aaf5fafad8a767844f1645dad0f00bbcd03bcd481e6a500c7c95c5546bcf9a1168b680fe53

    • C:\Users\Admin\AppData\Local\Temp\Thought.mp4

      Filesize

      90KB

      MD5

      51e6f0d5338ab11618a26b47b14a1097

      SHA1

      7da5ec55ce0a87e484f5b646da1bea758ccdce84

      SHA256

      dd75bd7e0ca627707eb0afcc3ae7d627b31eb185b339e9f53949080bae63df2a

      SHA512

      18f6a1f815a5cd662af8a6f7914f3180b18f29d1082d4ffb600d48c2b4bb01030754d661d24e15a8cb3bd771cba54ee23ab16fb1bac7cbcc653768eb31f8a24a

    • C:\Users\Admin\AppData\Local\Temp\Thumbnails.mp4

      Filesize

      88KB

      MD5

      185db753f2ce4099d727264a038822de

      SHA1

      bf99b19503513beb800af5d4f594ea0393ac8ca7

      SHA256

      746f8ebb755e8089c127a8e4f0c9cf991e24cb1ea1a4e2b81b418dbb2019ec9b

      SHA512

      fc664956c1059b2b895b036fac79d13707190ebfbf90207f4b75924d2ddecb46c300796edacd7599e9b28958adae68200baced0666a1dc56f5ec45db6a278189

    • C:\Users\Admin\AppData\Local\Temp\Usually.mp4

      Filesize

      88KB

      MD5

      80baecd6e99813e240e5719c52ff5977

      SHA1

      4ad1bff41bf97104c68f9b2a3f8798a2b4d4cea2

      SHA256

      818e68fd0defeb7d976bc77e04ded8bc5f64541e44ef706e7e765a71e584785b

      SHA512

      dcb42ad79d7d956b5dd5fea5af67ad9aaa2be84233b59660624700e5d4ff45fa65c467d7e296169b6e5de37769e5adb14847da8e285bfba5a01dd979fccdf750

    • memory/5112-757-0x0000000001000000-0x000000000133C000-memory.dmp

      Filesize

      3.2MB

    • memory/5112-760-0x0000000006100000-0x00000000066A6000-memory.dmp

      Filesize

      5.6MB

    • memory/5112-761-0x0000000005A50000-0x0000000005AB6000-memory.dmp

      Filesize

      408KB

    • memory/5112-762-0x0000000006AB0000-0x0000000006B42000-memory.dmp

      Filesize

      584KB

    • memory/5112-763-0x00000000060C0000-0x00000000060CA000-memory.dmp

      Filesize

      40KB

    • memory/5112-766-0x0000000007050000-0x00000000070EC000-memory.dmp

      Filesize

      624KB

    • memory/5112-767-0x0000000007540000-0x0000000007562000-memory.dmp

      Filesize

      136KB

    • memory/5112-768-0x0000000007570000-0x00000000078C7000-memory.dmp

      Filesize

      3.3MB