
Malicious artifacts seen in the context of a contacted hostįound malicious artifacts related to "104.22.77.208".

"GamingGurus Krunker Client.exe" wrote 8 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\1fgDjbzNU7BP39YVtfhEPuoPQZ7\GamingGurus Krunker Client.exe" (Handle: 1808) "GamingGurus Krunker Client.exe" wrote 52 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\1fgDjbzNU7BP39YVtfhEPuoPQZ7\GamingGurus Krunker Client.exe" (Handle: 1808) "GamingGurus Krunker Client.exe" wrote 32 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\1fgDjbzNU7BP39YVtfhEPuoPQZ7\GamingGurus Krunker Client.exe" (Handle: 1808) "GamingGurus Krunker Client.exe" wrote 8 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\1fgDjbzNU7BP39YVtfhEPuoPQZ7\GamingGurus Krunker Client.exe" (Handle: 1720) "GamingGurus Krunker Client.exe" wrote 52 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\1fgDjbzNU7BP39YVtfhEPuoPQZ7\GamingGurus Krunker Client.exe" (Handle: 1720) "GamingGurus Krunker Client.exe" wrote 32 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\1fgDjbzNU7BP39YVtfhEPuoPQZ7\GamingGurus Krunker Client.exe" (Handle: 1720) "GamingGurus Krunker Client.exe" wrote 8 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\1fgDjbzNU7BP39YVtfhEPuoPQZ7\GamingGurus Krunker Client.exe" (Handle: 1680) "GamingGurus Krunker Client.exe" wrote 52 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\1fgDjbzNU7BP39YVtfhEPuoPQZ7\GamingGurus Krunker Client.exe" (Handle: 1680)

"GamingGurus Krunker Client.exe" wrote 32 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\1fgDjbzNU7BP39YVtfhEPuoPQZ7\GamingGurus Krunker Client.exe" (Handle: 1680) "GamingGurus Krunker Client.exe" wrote 8 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\1fgDjbzNU7BP39YVtfhEPuoPQZ7\GamingGurus Krunker Client.exe" (Handle: 1664)

"GamingGurus Krunker Client.exe" wrote 52 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\1fgDjbzNU7BP39YVtfhEPuoPQZ7\GamingGurus Krunker Client.exe" (Handle: 1664) "GamingGurus Krunker Client.exe" wrote 32 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\1fgDjbzNU7BP39YVtfhEPuoPQZ7\GamingGurus Krunker Client.exe" (Handle: 1664) "GamingGurusKrunkerClient.exe" wrote 8 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\1fgDjbzNU7BP39YVtfhEPuoPQZ7\GamingGurus Krunker Client.exe" (Handle: 436)

"GamingGurusKrunkerClient.exe" wrote 4 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\1fgDjbzNU7BP39YVtfhEPuoPQZ7\GamingGurus Krunker Client.exe" (Handle: 436) "GamingGurusKrunkerClient.exe" wrote 52 bytes to a remote process "C:\Users\%USERNAME%\AppData\Local\Temp\1fgDjbzNU7BP39YVtfhEPuoPQZ7\GamingGurus Krunker Client.exe" (Handle: 436) "GamingGurusKrunkerClient.exe" wrote 32 bytes to a remote process "%TEMP%\1fgDjbzNU7BP39YVtfhEPuoPQZ7\GamingGurus Krunker Client.exe" (Handle: 436)
