Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-09-2024 05:06

General

  • Target

    324d93ead119e4313f6f81696eeaf7f9.exe

  • Size

    1.8MB

  • MD5

    324d93ead119e4313f6f81696eeaf7f9

  • SHA1

    42af7724e7c738fbf387f2c6f5fb428c2e0686aa

  • SHA256

    4341e8171f70008e0dc7c6309ea60371cc68e29ad7ee457914f5bf676fd30c3d

  • SHA512

    96c8056c6756441ccd5326785792b93246e51ce1587c7314c5b16679345d04a4470e3103b40ccc6a04b8478dce2b2ad15c9f2ab1307fc593556ee0a4af66fde2

  • SSDEEP

    49152:UxSZP+P67T+A69IBdQqdigMCw3bPzJER2NtKZGLJeAIEj:UxSU67T+APkg9wSatKA8ZI

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Extracted

Family

redline

Botnet

LiveTraffic

C2

95.179.250.45:26212

Extracted

Family

redline

Botnet

@LOGSCLOUDYT_BOT

C2

65.21.18.51:45580

Extracted

Family

stealc

Botnet

default2

C2

http://185.215.113.17

Attributes
  • url_path

    /2fb6c2cc8dce150a.php

Extracted

Family

stealc

Botnet

default

C2

http://91.202.233.158

Attributes
  • url_path

    /e96ea2db21fa9a1b.php

Extracted

Family

redline

Botnet

TG CLOUD @RLREBORN Admin @FATHEROFCARDERS

C2

89.105.223.196:29862

Extracted

Family

stealc

Botnet

save

C2

http://185.215.113.37

Attributes
  • url_path

    /e2b1563c6670f193.php

Extracted

Family

cryptbot

C2

sevtvf17pt.top

analforeverlovyu.top

Attributes
  • url_path

    /v1/upload.php

Extracted

Family

redline

Botnet

newbundle2

C2

185.215.113.67:15206

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://racedsuitreow.shop/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Detects ZharkBot payload 3 IoCs

    ZharkBot is a botnet written C++.

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • ZharkBot

    ZharkBot is a botnet written C++.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
  • Downloads MZ/PE file
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 20 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 13 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 47 IoCs
  • Identifies Wine through registry keys 2 TTPs 10 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 5 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 7 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 64 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
  • Suspicious use of SetThreadContext 7 IoCs
  • Drops file in Program Files directory 18 IoCs
  • Drops file in Windows directory 7 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 22 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 8 IoCs
  • Modifies registry class 3 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3428
      • C:\Users\Admin\AppData\Local\Temp\324d93ead119e4313f6f81696eeaf7f9.exe
        "C:\Users\Admin\AppData\Local\Temp\324d93ead119e4313f6f81696eeaf7f9.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1448
        • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
          "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4604
          • C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe
            "C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3044
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              5⤵
              • System Location Discovery: System Language Discovery
              • Modifies system certificate store
              PID:3308
          • C:\Users\Admin\AppData\Local\Temp\1000004001\12dsvc.exe
            "C:\Users\Admin\AppData\Local\Temp\1000004001\12dsvc.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:4220
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              5⤵
              • Checks computer location settings
              • Suspicious use of WriteProcessMemory
              PID:1572
              • C:\Users\Admin\AppData\Roaming\13KcICKwTZ.exe
                "C:\Users\Admin\AppData\Roaming\13KcICKwTZ.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4400
              • C:\Users\Admin\AppData\Roaming\kySHTE87Kb.exe
                "C:\Users\Admin\AppData\Roaming\kySHTE87Kb.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3024
          • C:\Users\Admin\AppData\Local\Temp\1000005001\Nework.exe
            "C:\Users\Admin\AppData\Local\Temp\1000005001\Nework.exe"
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:2488
            • C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
              "C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe"
              5⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:3240
              • C:\Users\Admin\AppData\Local\Temp\1000063001\JavvvUmar.exe
                "C:\Users\Admin\AppData\Local\Temp\1000063001\JavvvUmar.exe"
                6⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Checks processor information in registry
                PID:3808
                • C:\Windows\SysWOW64\schtasks.exe
                  "C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
                  7⤵
                  • Scheduled Task/Job: Scheduled Task
                  PID:7088
          • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe
            "C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            PID:1596
          • C:\Users\Admin\AppData\Local\Temp\1000191001\needmoney.exe
            "C:\Users\Admin\AppData\Local\Temp\1000191001\needmoney.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:468
            • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
              C:\Users\Admin\AppData\Local\Temp\svchost015.exe
              5⤵
              • Executes dropped EXE
              PID:3328
          • C:\Users\Admin\AppData\Local\Temp\1000254001\penis.exe
            "C:\Users\Admin\AppData\Local\Temp\1000254001\penis.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1136
          • C:\Users\Admin\AppData\Local\Temp\1000284001\acentric.exe
            "C:\Users\Admin\AppData\Local\Temp\1000284001\acentric.exe"
            4⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of AdjustPrivilegeToken
            PID:1244
          • C:\Users\Admin\AppData\Local\Temp\1000285001\2.exe
            "C:\Users\Admin\AppData\Local\Temp\1000285001\2.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:3692
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
              5⤵
                PID:3708
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 412
                  6⤵
                  • Program crash
                  PID:4408
            • C:\Users\Admin\AppData\Local\Temp\1000287001\splwow64.exe
              "C:\Users\Admin\AppData\Local\Temp\1000287001\splwow64.exe"
              4⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Drops file in Windows directory
              PID:3564
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c move Emotions Emotions.bat & Emotions.bat
                5⤵
                • System Location Discovery: System Language Discovery
                PID:4868
                • C:\Windows\SysWOW64\tasklist.exe
                  tasklist
                  6⤵
                  • Enumerates processes with tasklist
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1876
                • C:\Windows\SysWOW64\findstr.exe
                  findstr /I "wrsa opssvc"
                  6⤵
                  • System Location Discovery: System Language Discovery
                  PID:320
                • C:\Windows\SysWOW64\tasklist.exe
                  tasklist
                  6⤵
                  • Enumerates processes with tasklist
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1788
                • C:\Windows\SysWOW64\findstr.exe
                  findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"
                  6⤵
                  • System Location Discovery: System Language Discovery
                  PID:3384
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c md 607698
                  6⤵
                    PID:5088
                  • C:\Windows\SysWOW64\findstr.exe
                    findstr /V "MaskBathroomCompositionInjection" Participants
                    6⤵
                      PID:4408
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c copy /b ..\Navy + ..\Temperature + ..\Streaming + ..\Ashley + ..\Ensures + ..\Language + ..\Viruses + ..\Bet + ..\Fla + ..\Asbestos + ..\Width Q
                      6⤵
                        PID:3236
                      • C:\Users\Admin\AppData\Local\Temp\607698\Waters.pif
                        Waters.pif Q
                        6⤵
                        • Suspicious use of NtCreateUserProcessOtherParentProcess
                        • Checks computer location settings
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        PID:3048
                        • C:\Users\Admin\AppData\Local\Temp\1000404101\Installeraus.exe
                          "C:\Users\Admin\AppData\Local\Temp\1000404101\Installeraus.exe"
                          7⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:5384
                          • C:\Users\Admin\AppData\Roaming\MSIX\meshagent32-group.exe
                            "C:\Users\Admin\AppData\Roaming\MSIX\meshagent32-group.exe" -fullinstall
                            8⤵
                            • Sets service image path in registry
                            • Executes dropped EXE
                            • Drops file in Program Files directory
                            • System Location Discovery: System Language Discovery
                            PID:6216
                        • C:\Users\Admin\AppData\Local\Temp\1000429001\66f0297e9c3eb_15.exe
                          "C:\Users\Admin\AppData\Local\Temp\1000429001\66f0297e9c3eb_15.exe"
                          7⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • System Location Discovery: System Language Discovery
                          PID:2288
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                            8⤵
                            • System Location Discovery: System Language Discovery
                            PID:2756
                        • C:\Users\Admin\AppData\Local\Temp\1000430001\channel3.exe
                          "C:\Users\Admin\AppData\Local\Temp\1000430001\channel3.exe"
                          7⤵
                          • Executes dropped EXE
                          • Checks processor information in registry
                          PID:4848
                      • C:\Windows\SysWOW64\choice.exe
                        choice /d y /t 5
                        6⤵
                        • System Location Discovery: System Language Discovery
                        PID:1688
                  • C:\Users\Admin\AppData\Local\Temp\1000290001\crypted.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000290001\crypted.exe"
                    4⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • System Location Discovery: System Language Discovery
                    PID:4540
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      5⤵
                        PID:4760
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        5⤵
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3556
                    • C:\Users\Admin\AppData\Local\Temp\1000308001\59fb879b29.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000308001\59fb879b29.exe"
                      4⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3024
                    • C:\Users\Admin\AppData\Local\Temp\1000314001\LummaC222222.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000314001\LummaC222222.exe"
                      4⤵
                      • Executes dropped EXE
                      PID:5000
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 1220
                        5⤵
                        • Program crash
                        PID:1136
                    • C:\Users\Admin\AppData\Local\Temp\1000318001\66ed86be077bb_12.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000318001\66ed86be077bb_12.exe"
                      4⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4760
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        5⤵
                          PID:6660
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                          5⤵
                            PID:1900
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                            5⤵
                              PID:7036
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                              5⤵
                              • System Location Discovery: System Language Discovery
                              PID:2076
                          • C:\Users\Admin\AppData\Local\Temp\1000321001\2.exe
                            "C:\Users\Admin\AppData\Local\Temp\1000321001\2.exe"
                            4⤵
                            • Checks computer location settings
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Checks processor information in registry
                            PID:4084
                            • C:\Users\Admin\AppData\Local\Temp\service123.exe
                              "C:\Users\Admin\AppData\Local\Temp\service123.exe"
                              5⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • System Location Discovery: System Language Discovery
                              PID:3756
                            • C:\Windows\SysWOW64\schtasks.exe
                              "C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
                              5⤵
                              • System Location Discovery: System Language Discovery
                              • Scheduled Task/Job: Scheduled Task
                              PID:5216
                          • C:\Users\Admin\AppData\Local\Temp\1000322001\newbundle2.exe
                            "C:\Users\Admin\AppData\Local\Temp\1000322001\newbundle2.exe"
                            4⤵
                            • Checks computer location settings
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3504
                            • C:\Users\Admin\AppData\Local\Temp\NetSup_Buil2d.exe
                              "C:\Users\Admin\AppData\Local\Temp\NetSup_Buil2d.exe"
                              5⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Modifies registry class
                              PID:6412
                          • C:\Users\Admin\AppData\Local\Temp\1000336001\XM.exe
                            "C:\Users\Admin\AppData\Local\Temp\1000336001\XM.exe"
                            4⤵
                            • Executes dropped EXE
                            • Suspicious use of AdjustPrivilegeToken
                            PID:888
                          • C:\Users\Admin\AppData\Local\Temp\1000337001\f0644d4484.exe
                            "C:\Users\Admin\AppData\Local\Temp\1000337001\f0644d4484.exe"
                            4⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Checks computer location settings
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Drops file in Windows directory
                            PID:5556
                            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                              "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
                              5⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Checks computer location settings
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Adds Run key to start application
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              PID:712
                              • C:\Users\Admin\AppData\Local\Temp\1000002001\848231258a.exe
                                "C:\Users\Admin\AppData\Local\Temp\1000002001\848231258a.exe"
                                6⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                PID:5372
                              • C:\Users\Admin\AppData\Local\Temp\1000004101\b7e06ad7db.exe
                                "C:\Users\Admin\AppData\Local\Temp\1000004101\b7e06ad7db.exe"
                                6⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: GetForegroundWindowSpam
                                • Suspicious use of FindShellTrayWindow
                                • Suspicious use of SendNotifyMessage
                                PID:5848
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
                                  7⤵
                                    PID:2196
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
                                      8⤵
                                      • Checks processor information in registry
                                      • Modifies registry class
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SendNotifyMessage
                                      • Suspicious use of SetWindowsHookEx
                                      PID:3500
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1988 -parentBuildID 20240401114208 -prefsHandle 1904 -prefMapHandle 1896 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8f134529-ce4f-4d47-a43c-25559fe84cde} 3500 "\\.\pipe\gecko-crash-server-pipe.3500" gpu
                                        9⤵
                                          PID:6492
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2448 -parentBuildID 20240401114208 -prefsHandle 2440 -prefMapHandle 2408 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {12725295-a978-4bf6-aebc-4c59d4a3d2e9} 3500 "\\.\pipe\gecko-crash-server-pipe.3500" socket
                                          9⤵
                                            PID:6128
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2992 -childID 1 -isForBrowser -prefsHandle 2984 -prefMapHandle 3144 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1232 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {74605969-01b5-47c6-89ec-2d7dbd6bd97d} 3500 "\\.\pipe\gecko-crash-server-pipe.3500" tab
                                            9⤵
                                              PID:6896
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3652 -childID 2 -isForBrowser -prefsHandle 3636 -prefMapHandle 1260 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1232 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c01abfe6-2399-47cc-9139-8779d275a4fb} 3500 "\\.\pipe\gecko-crash-server-pipe.3500" tab
                                              9⤵
                                                PID:5420
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4220 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4264 -prefMapHandle 4208 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b35c3b2b-4328-435b-9b73-a11d5f6f6028} 3500 "\\.\pipe\gecko-crash-server-pipe.3500" utility
                                                9⤵
                                                • Checks processor information in registry
                                                PID:1644
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5000 -childID 3 -isForBrowser -prefsHandle 4968 -prefMapHandle 4972 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1232 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9dde3dc7-ae5f-445a-aa13-861be1a712b2} 3500 "\\.\pipe\gecko-crash-server-pipe.3500" tab
                                                9⤵
                                                  PID:5752
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5168 -childID 4 -isForBrowser -prefsHandle 5128 -prefMapHandle 5132 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1232 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2dbd57b7-000b-4dc2-bdec-a9e3e19683b3} 3500 "\\.\pipe\gecko-crash-server-pipe.3500" tab
                                                  9⤵
                                                    PID:388
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5428 -childID 5 -isForBrowser -prefsHandle 5124 -prefMapHandle 5348 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1232 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fd98e364-bf2e-40ef-be7b-5c1f6f23ad18} 3500 "\\.\pipe\gecko-crash-server-pipe.3500" tab
                                                    9⤵
                                                      PID:2044
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5204 -childID 6 -isForBrowser -prefsHandle 5228 -prefMapHandle 5616 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1232 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {76ba7adf-d5f3-449f-9b8b-013ba7ce58ec} 3500 "\\.\pipe\gecko-crash-server-pipe.3500" tab
                                                      9⤵
                                                        PID:5092
                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1000008141\blo.ps1"
                                                  6⤵
                                                  • Command and Scripting Interpreter: PowerShell
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:6688
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk --disable-features=TranslateUI --disable-infobars --no-first-run --disable-popup-blocking --disable-extensions --no-default-browser-check --app=https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
                                                    7⤵
                                                      PID:1808
                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk --disable-features=TranslateUI --disable-infobars --no-first-run --disable-popup-blocking --disable-extensions --no-default-browser-check --app=https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
                                                        8⤵
                                                        • Checks processor information in registry
                                                        PID:3352
                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\s5k4ua2e\s5k4ua2e.cmdline"
                                                      7⤵
                                                        PID:5052
                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESEB6.tmp" "c:\Users\Admin\AppData\Local\Temp\s5k4ua2e\CSC4461AC1AA684DA39AF8B776487E958B.TMP"
                                                          8⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:704
                                                    • C:\Users\Admin\1000015002\9dfba951b7.exe
                                                      "C:\Users\Admin\1000015002\9dfba951b7.exe"
                                                      6⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • System Location Discovery: System Language Discovery
                                                      PID:5672
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /c schtasks.exe /create /tn "Tuition" /tr "wscript //B 'C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js'" /sc minute /mo 5 /F
                                              2⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:3624
                                              • C:\Windows\SysWOW64\schtasks.exe
                                                schtasks.exe /create /tn "Tuition" /tr "wscript //B 'C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js'" /sc minute /mo 5 /F
                                                3⤵
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:4836
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QuantumFlow.url" & echo URL="C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QuantumFlow.url" & exit
                                              2⤵
                                              • Drops startup file
                                              • System Location Discovery: System Language Discovery
                                              PID:3076
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1036,i,5469445176230119590,7931734017267321834,262144 --variations-seed-version --mojo-platform-channel-handle=3956 /prefetch:8
                                            1⤵
                                              PID:1388
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --field-trial-handle=2784,i,5469445176230119590,7931734017267321834,262144 --variations-seed-version --mojo-platform-channel-handle=2300 /prefetch:3
                                              1⤵
                                                PID:688
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3708 -ip 3708
                                                1⤵
                                                  PID:1588
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 5000 -ip 5000
                                                  1⤵
                                                    PID:2128
                                                  • C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
                                                    C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
                                                    1⤵
                                                    • Executes dropped EXE
                                                    PID:1588
                                                  • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                    C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                    1⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    PID:5288
                                                  • C:\Windows\system32\OpenWith.exe
                                                    C:\Windows\system32\OpenWith.exe -Embedding
                                                    1⤵
                                                    • Modifies registry class
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:6444
                                                  • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe
                                                    "C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"
                                                    1⤵
                                                    • Executes dropped EXE
                                                    • Drops file in System32 directory
                                                    • Drops file in Program Files directory
                                                    • System Location Discovery: System Language Discovery
                                                    • Modifies data under HKEY_USERS
                                                    PID:4844
                                                    • C:\Windows\SysWOW64\wbem\wmic.exe
                                                      wmic SystemEnclosure get ChassisTypes
                                                      2⤵
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:4848
                                                    • C:\Windows\SysWOW64\wbem\wmic.exe
                                                      wmic os get oslanguage /FORMAT:LIST
                                                      2⤵
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:7040
                                                    • C:\Windows\SysWOW64\wbem\wmic.exe
                                                      wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                      2⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:6796
                                                    • C:\Windows\SysWOW64\wbem\wmic.exe
                                                      wmic os get oslanguage /FORMAT:LIST
                                                      2⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:5556
                                                    • C:\Windows\SysWOW64\wbem\wmic.exe
                                                      wmic SystemEnclosure get ChassisTypes
                                                      2⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:6300
                                                    • C:\Windows\SysWOW64\wbem\wmic.exe
                                                      wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                      2⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:5656
                                                  • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe
                                                    "C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"
                                                    1⤵
                                                    • Executes dropped EXE
                                                    • Drops file in System32 directory
                                                    • Drops file in Program Files directory
                                                    • System Location Discovery: System Language Discovery
                                                    • Modifies data under HKEY_USERS
                                                    PID:5308
                                                    • C:\Windows\SysWOW64\wbem\wmic.exe
                                                      wmic SystemEnclosure get ChassisTypes
                                                      2⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:1352
                                                    • C:\Windows\SysWOW64\wbem\wmic.exe
                                                      wmic os get oslanguage /FORMAT:LIST
                                                      2⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:6608
                                                    • C:\Windows\SysWOW64\wbem\wmic.exe
                                                      wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                      2⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:5736
                                                    • C:\Windows\SysWOW64\wbem\wmic.exe
                                                      wmic SystemEnclosure get ChassisTypes
                                                      2⤵
                                                        PID:3984
                                                      • C:\Windows\SysWOW64\wbem\wmic.exe
                                                        wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                        2⤵
                                                          PID:6772
                                                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                        C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                        1⤵
                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                        • Checks BIOS information in registry
                                                        • Executes dropped EXE
                                                        • Identifies Wine through registry keys
                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                        PID:6700
                                                      • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                        C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                        1⤵
                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                        • Checks BIOS information in registry
                                                        • Executes dropped EXE
                                                        • Identifies Wine through registry keys
                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                        PID:5476
                                                      • C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
                                                        C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
                                                        1⤵
                                                        • Executes dropped EXE
                                                        PID:824
                                                      • C:\Users\Admin\AppData\Local\Temp\service123.exe
                                                        C:\Users\Admin\AppData\Local\Temp\/service123.exe
                                                        1⤵
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        PID:2936
                                                      • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe
                                                        "C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"
                                                        1⤵
                                                        • Executes dropped EXE
                                                        • Drops file in System32 directory
                                                        • Drops file in Program Files directory
                                                        • System Location Discovery: System Language Discovery
                                                        • Modifies data under HKEY_USERS
                                                        PID:6444
                                                        • C:\Windows\SysWOW64\wbem\wmic.exe
                                                          wmic SystemEnclosure get ChassisTypes
                                                          2⤵
                                                            PID:4288
                                                          • C:\Windows\SysWOW64\wbem\wmic.exe
                                                            wmic os get oslanguage /FORMAT:LIST
                                                            2⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:5532
                                                          • C:\Windows\SysWOW64\wbem\wmic.exe
                                                            wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                            2⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:3152
                                                          • C:\Windows\SysWOW64\wbem\wmic.exe
                                                            wmic SystemEnclosure get ChassisTypes
                                                            2⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:6232
                                                          • C:\Windows\SysWOW64\wbem\wmic.exe
                                                            wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                            2⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:4540
                                                        • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe
                                                          "C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"
                                                          1⤵
                                                          • Executes dropped EXE
                                                          • Drops file in System32 directory
                                                          • Drops file in Program Files directory
                                                          • Modifies data under HKEY_USERS
                                                          PID:1448
                                                          • C:\Windows\SysWOW64\wbem\wmic.exe
                                                            wmic SystemEnclosure get ChassisTypes
                                                            2⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:1044
                                                          • C:\Windows\SysWOW64\wbem\wmic.exe
                                                            wmic os get oslanguage /FORMAT:LIST
                                                            2⤵
                                                              PID:6096
                                                            • C:\Windows\SysWOW64\wbem\wmic.exe
                                                              wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                              2⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:6660
                                                            • C:\Windows\SysWOW64\wbem\wmic.exe
                                                              wmic SystemEnclosure get ChassisTypes
                                                              2⤵
                                                                PID:780
                                                              • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                2⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:1864
                                                            • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe
                                                              "C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"
                                                              1⤵
                                                              • Executes dropped EXE
                                                              • Drops file in System32 directory
                                                              • Drops file in Program Files directory
                                                              • Modifies data under HKEY_USERS
                                                              PID:2992
                                                              • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                wmic SystemEnclosure get ChassisTypes
                                                                2⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:6388
                                                              • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                wmic os get oslanguage /FORMAT:LIST
                                                                2⤵
                                                                  PID:6328
                                                                • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                  wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                  2⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:3280
                                                                • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                  wmic SystemEnclosure get ChassisTypes
                                                                  2⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:5212
                                                                • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                  wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                  2⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:4568
                                                              • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe
                                                                "C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"
                                                                1⤵
                                                                • Executes dropped EXE
                                                                • Drops file in System32 directory
                                                                • Drops file in Program Files directory
                                                                • Modifies data under HKEY_USERS
                                                                PID:5508
                                                                • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                  wmic SystemEnclosure get ChassisTypes
                                                                  2⤵
                                                                    PID:6668
                                                                  • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                    wmic os get oslanguage /FORMAT:LIST
                                                                    2⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:4940
                                                                  • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                    wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                    2⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:5488
                                                                  • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                    wmic SystemEnclosure get ChassisTypes
                                                                    2⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:4868
                                                                  • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                    wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                    2⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:6900
                                                                • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe
                                                                  "C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"
                                                                  1⤵
                                                                  • Executes dropped EXE
                                                                  • Drops file in System32 directory
                                                                  • Drops file in Program Files directory
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Modifies data under HKEY_USERS
                                                                  PID:6224
                                                                  • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                    wmic SystemEnclosure get ChassisTypes
                                                                    2⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:4908
                                                                  • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                    wmic os get oslanguage /FORMAT:LIST
                                                                    2⤵
                                                                      PID:6880
                                                                    • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                      wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                      2⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:5184
                                                                    • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                      wmic SystemEnclosure get ChassisTypes
                                                                      2⤵
                                                                        PID:2200
                                                                      • C:\Windows\SysWOW64\wbem\wmic.exe
                                                                        wmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"
                                                                        2⤵
                                                                          PID:1456

                                                                      Network

                                                                      MITRE ATT&CK Enterprise v15

                                                                      Replay Monitor

                                                                      Loading Replay Monitor...

                                                                      Downloads

                                                                      • C:\ProgramData\mozglue.dll

                                                                        Filesize

                                                                        593KB

                                                                        MD5

                                                                        c8fd9be83bc728cc04beffafc2907fe9

                                                                        SHA1

                                                                        95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                        SHA256

                                                                        ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                        SHA512

                                                                        fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                      • C:\ProgramData\nss3.dll

                                                                        Filesize

                                                                        2.0MB

                                                                        MD5

                                                                        1cc453cdf74f31e4d913ff9c10acdde2

                                                                        SHA1

                                                                        6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                                        SHA256

                                                                        ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                                        SHA512

                                                                        dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports

                                                                        Filesize

                                                                        2B

                                                                        MD5

                                                                        d751713988987e9331980363e24189ce

                                                                        SHA1

                                                                        97d170e1550eee4afc0af065b78cda302a97674c

                                                                        SHA256

                                                                        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                        SHA512

                                                                        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\xmd08l7e.default-release\cache2\entries\22386449CA13D8975B935875780066C6EF52CE37

                                                                        Filesize

                                                                        13KB

                                                                        MD5

                                                                        2974c224cd879b1a1a8295e16eb2f244

                                                                        SHA1

                                                                        ba14a119a8e5ff53707bed8b75247a936e6145b2

                                                                        SHA256

                                                                        827001ce4085ac2918f3a84b6d4b0b57ea0b371366dc3c1b08042372b24a3828

                                                                        SHA512

                                                                        ffdfee6eaeb76d79d123e74b9dc093a6b816a81d9949e6429ffdfe6e3ae586d23eb6a929ff0ccfec8ee68ccbc167393d906cfe8188934c760e601a872aeae76d

                                                                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\xmd08l7e.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                                                        Filesize

                                                                        7KB

                                                                        MD5

                                                                        c460716b62456449360b23cf5663f275

                                                                        SHA1

                                                                        06573a83d88286153066bae7062cc9300e567d92

                                                                        SHA256

                                                                        0ec0f16f92d876a9c1140d4c11e2b346a9292984d9a854360e54e99fdcd99cc0

                                                                        SHA512

                                                                        476bc3a333aace4c75d9a971ef202d5889561e10d237792ca89f8d379280262ce98cf3d4728460696f8d7ff429a508237764bf4a9ccb59fd615aee07bdcadf30

                                                                      • C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe

                                                                        Filesize

                                                                        312KB

                                                                        MD5

                                                                        389881b424cf4d7ec66de13f01c7232a

                                                                        SHA1

                                                                        d3bc5a793c1b8910e1ecc762b69b3866e4c5ba78

                                                                        SHA256

                                                                        9d1211b3869ca43840b7da1677b257ad37521aab47719c6fcfe343121760b746

                                                                        SHA512

                                                                        2b9517d5d9d972e8754a08863a29e3d3e3cfde58e20d433c85546c2298aad50ac8b069cafd5abb3c86e24263d662c6e1ea23c0745a2668dfd215ddbdfbd1ab96

                                                                      • C:\Users\Admin\AppData\Local\Temp\1000004001\12dsvc.exe

                                                                        Filesize

                                                                        1.1MB

                                                                        MD5

                                                                        6c9e7815208530b2574368f8a70e5790

                                                                        SHA1

                                                                        61d5d998abbbfe9c6efd9d38b8c99a3b48f8a7de

                                                                        SHA256

                                                                        c0f8b5afad6fab4136affd308519c36e3779d597413d00e79e7f939bd7bae782

                                                                        SHA512

                                                                        013b6ce1104d05cdd4587197c4e177ef13409db9c81084551450674833d3876a050035a4545a647a257538a2cb44aafaada534c9bfe8e2b5bcf6a9f2dcff134d

                                                                      • C:\Users\Admin\AppData\Local\Temp\1000004101\b7e06ad7db.exe

                                                                        Filesize

                                                                        900KB

                                                                        MD5

                                                                        3a7ddc76449ad883dec9ec0b7403f184

                                                                        SHA1

                                                                        2ebc330233fb1a0b090e7a0e21e86d962e4a09d5

                                                                        SHA256

                                                                        9192979001c860ed13f4f49a8a9b9703153eed270cf1282579c5e005edc65d98

                                                                        SHA512

                                                                        0488d1f108bbbb07050d0dfba5c8b94361f11ee53f2198649a9379ed1bcf052c022273b1356d73518ca19587cf4064fab9888c520d6ff97d4fee95af8a8c2e4d

                                                                      • C:\Users\Admin\AppData\Local\Temp\1000005001\Nework.exe

                                                                        Filesize

                                                                        416KB

                                                                        MD5

                                                                        f5d7b79ee6b6da6b50e536030bcc3b59

                                                                        SHA1

                                                                        751b555a8eede96d55395290f60adc43b28ba5e2

                                                                        SHA256

                                                                        2f1aff28961ba0ce85ea0e35b8936bc387f84f459a4a1d63d964ce79e34b8459

                                                                        SHA512

                                                                        532b17cd2a6ac5172b1ddba1e63edd51ab53a4527204415241e3a78e8ffeb9728071bde5ae1eefabefd2627f00963f8a5458668cd7b8df041c8683252ff56b46

                                                                      • C:\Users\Admin\AppData\Local\Temp\1000008141\blo.ps1

                                                                        Filesize

                                                                        4KB

                                                                        MD5

                                                                        90019cfd00d043c3f6da5719cd344c62

                                                                        SHA1

                                                                        034bd2d68f4ec66b227ab7d31d2135e28d75b131

                                                                        SHA256

                                                                        1401c46006791e4d0fea52e9e98991df542eb0a24c50da4856f4ac1eda5cd4ec

                                                                        SHA512

                                                                        7e00c5eade73a95225f71574b48d66e19241943f47732ed4d352440e6fcfc7c44b8cc4bdfeaa51b04f7bb16b3a4cc2005e1a4b71c578c4dd0399fabbe997b1f2

                                                                      • C:\Users\Admin\AppData\Local\Temp\1000063001\JavvvUmar.exe

                                                                        Filesize

                                                                        6.3MB

                                                                        MD5

                                                                        2426fa19f0c2cc5de92d6ef43337c2d1

                                                                        SHA1

                                                                        97b742a006365ad06a8d0933da8d72c51cca8e63

                                                                        SHA256

                                                                        4d10776348522e720fd36f175f9f735039e4aa3ae9543886320cd75e45e77754

                                                                        SHA512

                                                                        e6dfea55d923c4fa9a6e2e1d9dfa63ec1a5a4b34ce652dbed7b1442f92e628a18d7734128c735757665e07ceb4ca1fff891bea816925177462181242c6075690

                                                                      • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe

                                                                        Filesize

                                                                        187KB

                                                                        MD5

                                                                        7a02aa17200aeac25a375f290a4b4c95

                                                                        SHA1

                                                                        7cc94ca64268a9a9451fb6b682be42374afc22fd

                                                                        SHA256

                                                                        836799fd760eba25e15a55c75c50b977945c557065a708317e00f2c8f965339e

                                                                        SHA512

                                                                        f6ebfe7e087aa354722cea3fddd99b1883a862fb92bb5a5a86782ea846a1bff022ab7db4397930bcabaa05cb3d817de3a89331d41a565bc1da737f2c5e3720b6

                                                                      • C:\Users\Admin\AppData\Local\Temp\1000191001\needmoney.exe

                                                                        Filesize

                                                                        4.1MB

                                                                        MD5

                                                                        7fa5c660d124162c405984d14042506f

                                                                        SHA1

                                                                        69f0dff06ff1911b97a2a0aa4ca9046b722c6b2f

                                                                        SHA256

                                                                        fd3edfaff77dd969e3e0d086495e4c742d00e111df9f935ed61dfba8392584b2

                                                                        SHA512

                                                                        d50848adbfe75f509414acc97096dad191ae4cef54752bdddcb227ffc0f59bfd2770561e7b3c2a14f4a1423215f05847206ad5c242c7fd5b0655edf513b22f6c

                                                                      • C:\Users\Admin\AppData\Local\Temp\1000254001\penis.exe

                                                                        Filesize

                                                                        494KB

                                                                        MD5

                                                                        6760374f17416485fa941b354d3dd800

                                                                        SHA1

                                                                        d88389ec19ac3e87bc743ba3f8b7c518601fdbf9

                                                                        SHA256

                                                                        9dc31fbd03da881700908423eb50c6b0c42c87fec28e817449d3dd931802c9f5

                                                                        SHA512

                                                                        6e4d2f17cb93fe831198c2eaa35bf030d6a06d620645d3e1452c6bd6e77e42baa9dc323fd60a2c5ae1d89124adde69972c489739d4bd73ba01b95b829a777eab

                                                                      • C:\Users\Admin\AppData\Local\Temp\1000284001\acentric.exe

                                                                        Filesize

                                                                        454KB

                                                                        MD5

                                                                        37d198ad751d31a71acc9cb28ed0c64e

                                                                        SHA1

                                                                        8eb519b7a6df66d84c566605da9a0946717a921d

                                                                        SHA256

                                                                        1ed4a8b4c74aab435ea5cd459d5ac961e5a8ca28924801bd84d336135f30efde

                                                                        SHA512

                                                                        60923c0a8ce5fd397d49749ccee68ca3fe294d7323551ce9755410ac16bfff56a35bee3e6b9a67d57cdfcb43e4f164712f33cd255b76689174dcf4c475976c96

                                                                      • C:\Users\Admin\AppData\Local\Temp\1000285001\2.exe

                                                                        Filesize

                                                                        673KB

                                                                        MD5

                                                                        b859d1252109669c1a82b235aaf40932

                                                                        SHA1

                                                                        b16ea90025a7d0fad9196aa09d1091244af37474

                                                                        SHA256

                                                                        083d9bc8566b22e67b553f9e0b2f3bf6fe292220665dcc2fc10942cdc192125c

                                                                        SHA512

                                                                        9c0006055afd089ef2acbb253628494dd8c29bab9d5333816be8404f875c85ac342df82ae339173f853d3ebdb2261e59841352f78f6b4bd3bff3d0d606f30655

                                                                      • C:\Users\Admin\AppData\Local\Temp\1000287001\splwow64.exe

                                                                        Filesize

                                                                        1.3MB

                                                                        MD5

                                                                        2b01c9b0c69f13da5ee7889a4b17c45e

                                                                        SHA1

                                                                        27f0c1ae0ddeddc9efac38bc473476b103fef043

                                                                        SHA256

                                                                        d5526528363ceeb718d30bc669038759c4cd80a1d3e9c8c661b12b261dcc9e29

                                                                        SHA512

                                                                        23d4a0fc82b70cd2454a1be3d9b84b8ce7dd00ad7c3e8ad2b771b1b7cbca752c53feec5a3ac5a81d8384a9fc6583f63cc39f1ebe7de04d3d9b08be53641ec455

                                                                      • C:\Users\Admin\AppData\Local\Temp\1000290001\crypted.exe

                                                                        Filesize

                                                                        314KB

                                                                        MD5

                                                                        ff5afed0a8b802d74af1c1422c720446

                                                                        SHA1

                                                                        7135acfa641a873cb0c4c37afc49266bfeec91d8

                                                                        SHA256

                                                                        17ac37b4946539fa7fa68b12bd80946d340497a7971802b5848830ad99ea1e10

                                                                        SHA512

                                                                        11724d26e11b3146e0fc947c06c59c004c015de0afea24ec28a4eb8145fcd51e9b70007e17621c83f406d9aeb7cd96601245671d41c3fcc88a27c33bd7cf55ac

                                                                      • C:\Users\Admin\AppData\Local\Temp\1000308001\59fb879b29.exe

                                                                        Filesize

                                                                        1.8MB

                                                                        MD5

                                                                        58883b106a8e85025ddff83a48670669

                                                                        SHA1

                                                                        59aa6f964346383af028372e21ad7e9d2eb054e9

                                                                        SHA256

                                                                        d2f8bd4baf67c8a557e21303ca035fd9a712202ca6d1a2f78edeb5af27918079

                                                                        SHA512

                                                                        b621635bdf06980fbd52347c9cefb5c32a61d0008553690e6a85886763f9acd44d60211cbddb4d9890f55b657af3c16b232bdf16490832257ab7b0fdf383b253

                                                                      • C:\Users\Admin\AppData\Local\Temp\1000314001\LummaC222222.exe

                                                                        Filesize

                                                                        352KB

                                                                        MD5

                                                                        2f1d09f64218fffe7243a8b44345b27e

                                                                        SHA1

                                                                        72553e1b3a759c17f54e7b568f39b3f8f1b1cdbe

                                                                        SHA256

                                                                        4a553c39728410eb0ebd5e530fc47ef1bdf4b11848a69889e8301974fc26cde2

                                                                        SHA512

                                                                        5871e2925ca8375f3c3ce368c05eb67796e1fbec80649d3cc9c39b57ee33f46476d38d3ea8335e2f5518c79f27411a568209f9f6ef38a56650c7436bbaa3f909

                                                                      • C:\Users\Admin\AppData\Local\Temp\1000318001\66ed86be077bb_12.exe

                                                                        Filesize

                                                                        10.3MB

                                                                        MD5

                                                                        489f9c4fc0afa8d1be37bc5e2f57833b

                                                                        SHA1

                                                                        c2bac602a73c19b345b64e0b7cf2f837be307b61

                                                                        SHA256

                                                                        d9dbfbc8294cbf6a32d43413ed328594ee058d7356c26eb5cd196f9f4867c078

                                                                        SHA512

                                                                        7f43d972f58a025d09143c57351221fe7b10c1756a0c5578ac42698c21ea05986d4bbc0c7ff4be339c2d0930b505e4f4dda53c0800d84b059a21be938adb678e

                                                                      • C:\Users\Admin\AppData\Local\Temp\1000321001\2.exe

                                                                        Filesize

                                                                        6.4MB

                                                                        MD5

                                                                        f66beee3aae7cd92f02270a910b70231

                                                                        SHA1

                                                                        f8f1ce1dde9118e6d40426256756a201be9b0f65

                                                                        SHA256

                                                                        a89687d296782db168a92a496fb865d481666cf53588684f69ecac509711da16

                                                                        SHA512

                                                                        635b89682a25f6c64d4af69d6afebca753e6b0595edf5585231e7daa53778ceccd24d36783026e9785245cc9d14aebaf2fa4ca179f5eaefbd966a92140790480

                                                                      • C:\Users\Admin\AppData\Local\Temp\1000322001\newbundle2.exe

                                                                        Filesize

                                                                        304KB

                                                                        MD5

                                                                        58e8b2eb19704c5a59350d4ff92e5ab6

                                                                        SHA1

                                                                        171fc96dda05e7d275ec42840746258217d9caf0

                                                                        SHA256

                                                                        07d4b7768e13d79ac5f05f81167b29bb6fbf97828a289d8d11eec38939846834

                                                                        SHA512

                                                                        e7655762c5f2d10ec246d11f82d437a2717ad05be847b5e0fd055e3241caaca85430f424055b343e3a44c90d76a0ba07a6913c2208f374f59b61f8aa4477889f

                                                                      • C:\Users\Admin\AppData\Local\Temp\1000336001\XM.exe

                                                                        Filesize

                                                                        702KB

                                                                        MD5

                                                                        0940599cefe789664d6a032a27b25b73

                                                                        SHA1

                                                                        c6ee1fe58fdd7ba3c3f3d0e708228e53050cf4fa

                                                                        SHA256

                                                                        ed42c5f70c10694c1376f330cfbdcee52b72aed3b7eb25debcc1b2ba613c0922

                                                                        SHA512

                                                                        47c01da51b42cb086202d05f01613d81b75e37a8b718f13597a18d8693e3a6f8666d28d9c79abcd143d1d3c93d7a4051e551f4354306a7b57507967bc9adf781

                                                                      • C:\Users\Admin\AppData\Local\Temp\1000337001\f0644d4484.exe

                                                                        Filesize

                                                                        1.9MB

                                                                        MD5

                                                                        3864d645d16917d8368b5a36028692c4

                                                                        SHA1

                                                                        c3c9ea2456680620ed20a6800de133780ae4be36

                                                                        SHA256

                                                                        cebefb2613a8a479d83ff4f6cf8492510dc597727dbb8956f71ddd1fa52b4194

                                                                        SHA512

                                                                        f697a53f3302fee41d33bc7c6bce87fa91065b7f5578bc27e38fa5fb60ffac5cb56f440115a5ee87b1db9076d3cf1f29694c4e5866bd3e8d8eda9c2f29316dfd

                                                                      • C:\Users\Admin\AppData\Local\Temp\1000339001\FeelingSurfViewer.exe

                                                                        Filesize

                                                                        196B

                                                                        MD5

                                                                        62962daa1b19bbcc2db10b7bfd531ea6

                                                                        SHA1

                                                                        d64bae91091eda6a7532ebec06aa70893b79e1f8

                                                                        SHA256

                                                                        80c3fe2ae1062abf56456f52518bd670f9ec3917b7f85e152b347ac6b6faf880

                                                                        SHA512

                                                                        9002a0475fdb38541e78048709006926655c726e93e823b84e2dbf5b53fd539a5342e7266447d23db0e5528e27a19961b115b180c94f2272ff124c7e5c8304e7

                                                                      • C:\Users\Admin\AppData\Local\Temp\1000404101\Installeraus.exe

                                                                        Filesize

                                                                        1.8MB

                                                                        MD5

                                                                        749bd6bf56a6d0ad6a8a4e5712377555

                                                                        SHA1

                                                                        6e4ff640a527ed497505c402d1e7bdb26f3dd472

                                                                        SHA256

                                                                        e6148c7e8cec3a4565e97a139d2b09dbdf2f30460054fa168624fdc1050421d3

                                                                        SHA512

                                                                        250f1825f5d2577124606818a8c370bb862d74dfebddd8c25ec2b43448626b583e166e101f65ebe12b66b8767af7ad75a8d9f5a3afd4e10f4dd3e6239efe9a7d

                                                                      • C:\Users\Admin\AppData\Local\Temp\1000415001\torque.exe

                                                                        Filesize

                                                                        4KB

                                                                        MD5

                                                                        ddc9229a87f36e9d555ddae1c8d4ac09

                                                                        SHA1

                                                                        e902d5ab723fa81913dd73999da9778781647c28

                                                                        SHA256

                                                                        efec912465df5c55b4764e0277aa4c4c549e612b4f3c5abf77aaec647729f78a

                                                                        SHA512

                                                                        08b5ad94168bf90bae2f2917fde1b2a36650845fdcb23881d76ddddae73359fbd774c92083ba03a84083c48d4922afb339c637d49dfa67fbf9eb95b3bf86baa6

                                                                      • C:\Users\Admin\AppData\Local\Temp\1000429001\66f0297e9c3eb_15.exe

                                                                        Filesize

                                                                        10.5MB

                                                                        MD5

                                                                        38ef48a2e156067f1770497335e92066

                                                                        SHA1

                                                                        304bcccdfb486bf797d69f109f0b6fe64a94d945

                                                                        SHA256

                                                                        88efb8b6990e916e7590c2bd3f734f390f7c3d7b517a5fdc1baba0a2f6fbd54c

                                                                        SHA512

                                                                        7212757dc8bd59ce9e5d7e474b78324fae11b7a20dc1326fe34d2bdeff4a6b4e9e4471326656cc3db162feaec65ef0f0c96efb91f3ce9b3173f725195d4b7145

                                                                      • C:\Users\Admin\AppData\Local\Temp\1000430001\channel3.exe

                                                                        Filesize

                                                                        6.3MB

                                                                        MD5

                                                                        d048c147fe730a77e30b2efd85ebfe97

                                                                        SHA1

                                                                        febf2874b6fdc8a8fa7db8c524fe9d733cf6145b

                                                                        SHA256

                                                                        39ef51afa4b5a9f930af06bcb4bdf50e289b522c40888ff3015d9486b8b4cdcf

                                                                        SHA512

                                                                        f8f4830ff39cbcc3952a319fd4307c2f6bf268851f3f0cfa85af4071204232b196688eb3c91aff2b5982a368500b86092ce408a147f218264705dbf08f70c237

                                                                      • C:\Users\Admin\AppData\Local\Temp\170637797568

                                                                        Filesize

                                                                        96KB

                                                                        MD5

                                                                        a8991c4387f8cbafe6979b1155ddf833

                                                                        SHA1

                                                                        698f50cff86972759b5b1b9b7f3c4f4f39c2c9c8

                                                                        SHA256

                                                                        cabfe360ff2f121f166bfd31510fe01a19bddb74e8e3b0596588171032c40956

                                                                        SHA512

                                                                        4f35aa77c9c89d91311dbc369cc372d22b253a3f2e23373b675f959d9435c0930a23c1f9f865505ec86ea5b5b964614371faad181ec287e4c20067e5739b99f5

                                                                      • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe

                                                                        Filesize

                                                                        1.8MB

                                                                        MD5

                                                                        324d93ead119e4313f6f81696eeaf7f9

                                                                        SHA1

                                                                        42af7724e7c738fbf387f2c6f5fb428c2e0686aa

                                                                        SHA256

                                                                        4341e8171f70008e0dc7c6309ea60371cc68e29ad7ee457914f5bf676fd30c3d

                                                                        SHA512

                                                                        96c8056c6756441ccd5326785792b93246e51ce1587c7314c5b16679345d04a4470e3103b40ccc6a04b8478dce2b2ad15c9f2ab1307fc593556ee0a4af66fde2

                                                                      • C:\Users\Admin\AppData\Local\Temp\607698\Q

                                                                        Filesize

                                                                        794KB

                                                                        MD5

                                                                        7b5632dcd418bcbae2a9009dbaf85f37

                                                                        SHA1

                                                                        32aaf06166854718f0bcbb2f7173c2732cfb4d33

                                                                        SHA256

                                                                        361e9c3b62719b79bc280420b5f710e160fd55f2250bf605911ded7162483db4

                                                                        SHA512

                                                                        c834e90ccf2d35529c294319b8e9a49db7a7d67d0567e0739131d5af51170db32076d68147dc101f8047a75cb5b2275b25a9c8346a99a146a6798b9764316838

                                                                      • C:\Users\Admin\AppData\Local\Temp\607698\Waters.pif

                                                                        Filesize

                                                                        872KB

                                                                        MD5

                                                                        18ce19b57f43ce0a5af149c96aecc685

                                                                        SHA1

                                                                        1bd5ca29fc35fc8ac346f23b155337c5b28bbc36

                                                                        SHA256

                                                                        d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd

                                                                        SHA512

                                                                        a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558

                                                                      • C:\Users\Admin\AppData\Local\Temp\Asbestos

                                                                        Filesize

                                                                        60KB

                                                                        MD5

                                                                        19121d99734080f4fdd9ca3008168360

                                                                        SHA1

                                                                        b00acbdd3fa952df781ca9ad5c86ded9f2d51ec6

                                                                        SHA256

                                                                        37576e4b3a1e0004b4cf7da625b865a62d895411ed157c538f5f4cd3aa6fab7a

                                                                        SHA512

                                                                        e2e863d19e2f560c1deb018c3c2748be170b11fcb520ed7e7ea20727646bcacb0b5c3ed04e856943c67e51f5083c90aa3dd1f8794a83901a203c8bac4fa51c92

                                                                      • C:\Users\Admin\AppData\Local\Temp\Ashley

                                                                        Filesize

                                                                        52KB

                                                                        MD5

                                                                        e522956891659c41bd8550b8d5e16231

                                                                        SHA1

                                                                        4380c8a0c30db1532728cdb72707f9f1847cc87d

                                                                        SHA256

                                                                        ddb7f60ab5f8957955dd20f2dc270e3ef833d3727f374a8c4c444634bd05609d

                                                                        SHA512

                                                                        35c81ef1a2c040dbd52cad9f38fda43d8836d955b62e478ae941a4ba67d297dc1c4b40d6b30959c5d2f784d5cb0d19c795307906d52ad0e7eb72bd0e4235172f

                                                                      • C:\Users\Admin\AppData\Local\Temp\Bet

                                                                        Filesize

                                                                        55KB

                                                                        MD5

                                                                        0f3f07b667e947c4da38813d6d651e2a

                                                                        SHA1

                                                                        692622d5e5705f8f65db96f70d8c7c2f7fd5a640

                                                                        SHA256

                                                                        32b3d9d5bc58659ea524aa2cabd9cfc81b73e679e3d2cc899dfb00439612f5ff

                                                                        SHA512

                                                                        449ab13dd860b08570c589dc24e468dd880434c3be774ba4f078d8f116d710326fc546de621dce8a27e134f70f651d44642ec0ece37375332a7d7725e9ddcf9c

                                                                      • C:\Users\Admin\AppData\Local\Temp\Emotions

                                                                        Filesize

                                                                        19KB

                                                                        MD5

                                                                        b98d78c3abe777a5474a60e970a674ad

                                                                        SHA1

                                                                        079e438485e46aff758e2dff4356fdd2c7575d78

                                                                        SHA256

                                                                        2bc28afb291ece550a7cd2d0c5c060730eb1981d1cf122558d6971526c637eb4

                                                                        SHA512

                                                                        6218413866237bc1f6eada6554658a00c9fc55402e104576b33a2e8d4adf0fd952d8cc8d1ae3a02ebcfa030115fc388fc1a6f23b9d372f808e11e1b551064e5d

                                                                      • C:\Users\Admin\AppData\Local\Temp\Ensures

                                                                        Filesize

                                                                        75KB

                                                                        MD5

                                                                        c6fa82d60cfbf9e83b4cf3cbd1f01552

                                                                        SHA1

                                                                        a310c3577c5e439aa306a0a5dae2c75ea39c126e

                                                                        SHA256

                                                                        2686b284d1c21d06ab10829c16657334e13428210ccda89f68bfb8acbfc72b42

                                                                        SHA512

                                                                        e35a67a63fac7db37431bc0ab910a9c33a41e5a910ae79181a74aaf13ed23d65ef500a9e5a482e749cd9666c146d8403f83c6be2d9aa013d6d7c6bc0f07fac9c

                                                                      • C:\Users\Admin\AppData\Local\Temp\Fla

                                                                        Filesize

                                                                        82KB

                                                                        MD5

                                                                        e139e52f93ae3e19ab47f437cbe8b3de

                                                                        SHA1

                                                                        2d5b56c3c0a454fefbf7c7a466ad000c05258bd6

                                                                        SHA256

                                                                        e0c1c46fa4582a3826f7aed2f7fb454d3ee42a425f214321910c25cc1d8879d5

                                                                        SHA512

                                                                        4feba8bf6916c979fa45e16a368f22a165985e1dfd75697fd7a7534f5e64afe438206074b2f8aa884d5666e80c55544c62d5cc48f8429e7c843c01d1af060878

                                                                      • C:\Users\Admin\AppData\Local\Temp\Language

                                                                        Filesize

                                                                        72KB

                                                                        MD5

                                                                        5de7106df85e2f96f46f642d98433ad1

                                                                        SHA1

                                                                        f77a8182904a897a8d41858c6f5b87c3e8b21195

                                                                        SHA256

                                                                        9201319c9c07e4312717845e59c9fe3a987f70575cd63e4c042db778ebe4d5e9

                                                                        SHA512

                                                                        7c4b04d513e80873ea3030162702e5eff8ea17b44844ba2809805f92c6a7d6ed396ef660b78e274334448f31c447f26212c6779e801f330611d6a01f04449047

                                                                      • C:\Users\Admin\AppData\Local\Temp\Navy

                                                                        Filesize

                                                                        56KB

                                                                        MD5

                                                                        d4eb107cfd9fc38ed7e7b253562e155a

                                                                        SHA1

                                                                        7fc17c27c9f4739c19211600398bf1ee9df84dc5

                                                                        SHA256

                                                                        68e9a8d57ba2a484dd28a1afed5262a86aff4d81467b93b4072f329fab984f4c

                                                                        SHA512

                                                                        3a95c48e7a61239cbaa857459a6a106536dfd8190205275e2549a9939116833141276dd5b6c81ff337d2340eedba633d9ca01a03fb490eb27184becc97626e0f

                                                                      • C:\Users\Admin\AppData\Local\Temp\NetSup_Buil2d.exe

                                                                        Filesize

                                                                        2.8MB

                                                                        MD5

                                                                        766e5fe445153ec0e000de5070643c04

                                                                        SHA1

                                                                        d60a075e4245efe9b3795bea24f1a47b4776b037

                                                                        SHA256

                                                                        504f5f18e828012d45b3e559f4414eabbb9cb31f9e4a3e05863077bb90629be4

                                                                        SHA512

                                                                        a8c5fb438f08966a1b4ccf5be3169bddb8a4f4deccbefb673d44c64a348bf5ad02dfc54ce8689d7703171069a60f275ecace1ad53aa289de273277e61feca09e

                                                                      • C:\Users\Admin\AppData\Local\Temp\Participants

                                                                        Filesize

                                                                        2KB

                                                                        MD5

                                                                        f0e725addf4ec15a56aa0bde5bd8b2a7

                                                                        SHA1

                                                                        1f54a49195d3f7fd93c5fec06cc5904c57995147

                                                                        SHA256

                                                                        7cbd6810cb4dd516eeb75df79d1db55f74471c11594333ac225f24bfc0fca7ca

                                                                        SHA512

                                                                        00f14e435e0f8396f6c94fd5ace3f3645e87511b9e41e8c7c7caadb751ed826f60362ac007c80e9c3bd16f8f31b3a9107cbb39bf5c26d20a0ab5129e695f5269

                                                                      • C:\Users\Admin\AppData\Local\Temp\Rick

                                                                        Filesize

                                                                        869KB

                                                                        MD5

                                                                        e0d37e7b879f4b4e0dde5006da5009bd

                                                                        SHA1

                                                                        33d19bdb8a0ae45a38ab6899381ca8bc1ea7c1a5

                                                                        SHA256

                                                                        27014daa44b8b92e1684970350c43bb1701d3a592572e650e1e00be1470e5f77

                                                                        SHA512

                                                                        68b2f357b3f02f3181df095ddc6fe8ff1810a150e832c245e428f973a096301b1d13fce00ad28af662c4aea371f872d56348fe7b5d2070ed3f1c49388efd3f60

                                                                      • C:\Users\Admin\AppData\Local\Temp\Streaming

                                                                        Filesize

                                                                        97KB

                                                                        MD5

                                                                        1501de696d22f872db44b548cba0e4fa

                                                                        SHA1

                                                                        ed8a2948aaf041bfd0196a180f5888bdddcb9879

                                                                        SHA256

                                                                        dcf4784ea71a3e1a42318c09183d4b5981009d296814d3679ca68eb0a7c9e2ef

                                                                        SHA512

                                                                        fa931ce9f6ab6928cec1c999f1aa6082bd7c5c74eff317fc6b1bd0d9f88de2753e157ebd4d6a2719c5861f7fdc12bcde5859945633c1a2b8e0967684771f84bc

                                                                      • C:\Users\Admin\AppData\Local\Temp\Temperature

                                                                        Filesize

                                                                        89KB

                                                                        MD5

                                                                        249d56cbe275c2258ccd964f0c6241d9

                                                                        SHA1

                                                                        8ac982fe39012b8812ed9dcf16e8e00c9a74b0bc

                                                                        SHA256

                                                                        7c16e21e29d442bf0b459d083198b22ee9c6d9926e3aa61f43dc3a1ee3ecb731

                                                                        SHA512

                                                                        440d7ff539e737e4e3b74549be7495d0f3b3230888355bc93eeca8084c80f255d988839ef455b4f6841fbaa64aabfdef9233130663aa3c24f711d01edb8e6be8

                                                                      • C:\Users\Admin\AppData\Local\Temp\Tmp4C8.tmp

                                                                        Filesize

                                                                        2KB

                                                                        MD5

                                                                        1420d30f964eac2c85b2ccfe968eebce

                                                                        SHA1

                                                                        bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                                                        SHA256

                                                                        f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                                                        SHA512

                                                                        6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                                                      • C:\Users\Admin\AppData\Local\Temp\Viruses

                                                                        Filesize

                                                                        89KB

                                                                        MD5

                                                                        7c9dd6f9fa719321b72805df762a82da

                                                                        SHA1

                                                                        64b135116d963e47848e29a002a3207bc01ab2c0

                                                                        SHA256

                                                                        98232a6528beb079d8fa9d77751722159d4974e6859df867efb3ba7a3eec4bec

                                                                        SHA512

                                                                        480d16e0d1e5021b9042378df235323324fc8341461e59d117471aa0da07fe8ef6367d0e14479b4bbb854f29d1f092ba3e9776fa2bf56b34ab73f5a858e6b3d0

                                                                      • C:\Users\Admin\AppData\Local\Temp\Width

                                                                        Filesize

                                                                        67KB

                                                                        MD5

                                                                        12d9ad507c856d833101c9e367466555

                                                                        SHA1

                                                                        b6398b345226279cfab1559bf3847e3d9526dcff

                                                                        SHA256

                                                                        8e7415ed2d0d5c6e69d6a02bc3928c9adf685a43932e4543084b917946361974

                                                                        SHA512

                                                                        0ba3913d4a3ca266f0812263245a25caa0bbd9b81766992c8dc05466d9cd86cb79843c53c29bb26c005ef15c0f90ab97978209038181501135a7b27fb5b34d62

                                                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_2ylkoj0z.jzu.ps1

                                                                        Filesize

                                                                        60B

                                                                        MD5

                                                                        d17fe0a3f47be24a6453e9ef58c94641

                                                                        SHA1

                                                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                        SHA256

                                                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                        SHA512

                                                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                      • C:\Users\Admin\AppData\Local\Temp\file1.dll

                                                                        Filesize

                                                                        2.7MB

                                                                        MD5

                                                                        6229d5ffa95cb4c395ef00876d2a1146

                                                                        SHA1

                                                                        1f797efb42bce6213ce2610c12e8af19803aa241

                                                                        SHA256

                                                                        a53c7b24658fe609bdc3153fa84e3c74c4727a2fc68306741d0476034a3ae2fa

                                                                        SHA512

                                                                        75ef4b04710fdbdba816c4677e6f489f0858c816d94b9bc42ec94ef00f5626d8df70afaed107d0679673001a1a16fa6f6568f132868b80a45a3c2e474f05ce91

                                                                      • C:\Users\Admin\AppData\Local\Temp\svchost015.exe

                                                                        Filesize

                                                                        2.9MB

                                                                        MD5

                                                                        b826dd92d78ea2526e465a34324ebeea

                                                                        SHA1

                                                                        bf8a0093acfd2eb93c102e1a5745fb080575372e

                                                                        SHA256

                                                                        7824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b

                                                                        SHA512

                                                                        1ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17

                                                                      • C:\Users\Admin\AppData\Local\Temp\tmp28FB.tmp

                                                                        Filesize

                                                                        56KB

                                                                        MD5

                                                                        7872fbf0a1bb518682babda3d8dc7b4e

                                                                        SHA1

                                                                        9714d4f9f7e7c3b9a99f656b88b3a10cbd9c65e4

                                                                        SHA256

                                                                        a821fa964b5c5273f0e4696e98815f07113c85436cc468f41f39722e7d2767c2

                                                                        SHA512

                                                                        f91bb32e1675f822af53ebc91dc5764625b13bc2e365dcf795e1132525857e5d43a18b2f53b4bb70722aef7a0eafd5b3e4d1805f8567d325d34ae41c281832c0

                                                                      • C:\Users\Admin\AppData\Local\Temp\tmp293B.tmp

                                                                        Filesize

                                                                        232KB

                                                                        MD5

                                                                        f82677ab961198fa81ae97f9c489d16b

                                                                        SHA1

                                                                        2370b975265156705f972e273b3eda265376328e

                                                                        SHA256

                                                                        85d2445ddd3342407f0e614b37fc80c52f1f75c61d9c3c02cff805becae9f599

                                                                        SHA512

                                                                        6c79fbdd8fa1cf0b978f66a08af6bb8857a4db6e9d7da356983fe4bac5fe2f6c1e82176c7ce35214a64373e21a7c9130ae59ff5ff2c2352b74eeebb7d0cba963

                                                                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                        Filesize

                                                                        479KB

                                                                        MD5

                                                                        09372174e83dbbf696ee732fd2e875bb

                                                                        SHA1

                                                                        ba360186ba650a769f9303f48b7200fb5eaccee1

                                                                        SHA256

                                                                        c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                                        SHA512

                                                                        b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                                        Filesize

                                                                        13.8MB

                                                                        MD5

                                                                        0a8747a2ac9ac08ae9508f36c6d75692

                                                                        SHA1

                                                                        b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                                        SHA256

                                                                        32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                                        SHA512

                                                                        59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                                      • C:\Users\Admin\AppData\Roaming\13KcICKwTZ.exe

                                                                        Filesize

                                                                        563KB

                                                                        MD5

                                                                        7909fbb384c65c469c877dda84add34c

                                                                        SHA1

                                                                        3280b2d39ccd8b669e95e971652ef6578136e377

                                                                        SHA256

                                                                        402b94a9f6fbbf5822c2f8c60f0dcb373cdeb9508b4730de6bdccbb6a52ba8ee

                                                                        SHA512

                                                                        a003ecaf93f5343275c8baa75d420266825a8cde7bf3ec8b3ae6ab2ff60c619a9d9dad20256c717ed8a5d925c8c16f31a63ac9c4edc01689a3584ce04810b788

                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2170637797-568393320-3232933035-1000\76b53b3ec448f7ccdda2063b15d2bfc3_76278eb0-9988-43b4-9423-af5897ebbcb4

                                                                        Filesize

                                                                        2KB

                                                                        MD5

                                                                        93be434bf6ffcc709759893486f14795

                                                                        SHA1

                                                                        707d869303e36b79ef7a08214ee1902bc176618d

                                                                        SHA256

                                                                        93fc29723f50edb4eb7fcb11fd8f27244c27e459008c46443c2e3f9c1513a6ac

                                                                        SHA512

                                                                        17e905cff0cc59ea912a4a49fb74be16bd1dc48a1846dee167ac71e7cd6501789c1207d0477242cfbc89b3bf1d4d12cffb82ae0567f25e5bbb64559169f61241

                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\AlternateServices.bin

                                                                        Filesize

                                                                        6KB

                                                                        MD5

                                                                        9e476eb4cebd4fa64169e28b76eefdff

                                                                        SHA1

                                                                        c3b6367709703e9e804ff629ef62e375d567ecf8

                                                                        SHA256

                                                                        a03568d62ba88490c81e0feb7fe754db537208065014e56a1e55f462083b5cbd

                                                                        SHA512

                                                                        4fbe9f7a9e22321ba241add1ac7969bf07a566c21c9811653b4f65a0ff0250e303588cb9baa59738555a147695b9fbea6b01982169c1ed340b09757ea4d0f5b5

                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\AlternateServices.bin

                                                                        Filesize

                                                                        8KB

                                                                        MD5

                                                                        2fc249fa1ce4c1be5b6e23d04fcead2f

                                                                        SHA1

                                                                        afeebdc5831e28c1566d202a916b90bf6906a146

                                                                        SHA256

                                                                        598d24432cea4fb27319cacb75dcb9eb0b0bef889fdbb7c109947ec11842796f

                                                                        SHA512

                                                                        a69396319495d959bcb456e582505b7809a03e854b7cd04b61f8291101aa5bb34f7abf9a57f6328dbee4c3e34433a2113b17f06c042d098ca24c553e4ab9888a

                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\AlternateServices.bin

                                                                        Filesize

                                                                        11KB

                                                                        MD5

                                                                        9ab5481cdb8c2c0ae329cfc778adc813

                                                                        SHA1

                                                                        cfab343fcf0007c258b537955d6cd75617864f08

                                                                        SHA256

                                                                        37260a894ca097c23cd7a080c1ab3334ab5b27f4c8f8f56a3e527b62e5feb1d3

                                                                        SHA512

                                                                        f1eeeb79ebb7454eed1719e85e5887cade442d6199f0408f48a75791b6392331b990d43abd7e1c9c5a3aed6cb3006581bfe1df6efbee4e706f67036e162c1e73

                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\AlternateServices.bin

                                                                        Filesize

                                                                        18KB

                                                                        MD5

                                                                        0c52ca2ceacd4cda0960d92568ee71b9

                                                                        SHA1

                                                                        d4c46f2f2165e247f5884202993047a1305a0775

                                                                        SHA256

                                                                        aae134931506e9482334358ff33ded6db8198bd19dce0990504cfd3dce4e0130

                                                                        SHA512

                                                                        ffb99549d8638aae19dfb4c2fe8e0d3b0cea62b0d61d5699cbdbae783fc15e0f49bea9508b63a32933fcfc80b91d09c97e837bb5a1e13ba3a452e39993f3b694

                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\datareporting\glean\db\data.safe.tmp

                                                                        Filesize

                                                                        28KB

                                                                        MD5

                                                                        4b44da429df1b7e1ca1e579625acb659

                                                                        SHA1

                                                                        eebf3af6c12edc869a1dbd5c11cbb0e91b1a3aa9

                                                                        SHA256

                                                                        6e9b18a56d24ae21158e93cbc47633a0d0fa00ffebaa36c34595b478eec86b02

                                                                        SHA512

                                                                        fe7b15ab84721830febb6ebaa566f01d2b0bc532c122c35dcb5ecdd4d2146accf8b0f9031a956fbd8be8b3a550d1d3e188375d62539c44bb52fb835bebb0ea49

                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\datareporting\glean\db\data.safe.tmp

                                                                        Filesize

                                                                        5KB

                                                                        MD5

                                                                        442f65f24b20ab738c629b9be3ab8d5d

                                                                        SHA1

                                                                        8047f7ff3990215005f274277df89bde3cb822ff

                                                                        SHA256

                                                                        10a75ab5090e66b7038204d27ac93950150bd230175a7dca7db18f7321c807f1

                                                                        SHA512

                                                                        88d990d604c521d3ad8b6117d8da2a86e1f3c7ec1a064b573c6df0b2cef804c9437e746fe50b1fa5cc518c1db8d8555ef3af7ed9e47a68ad3c14666436c172c4

                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\datareporting\glean\db\data.safe.tmp

                                                                        Filesize

                                                                        6KB

                                                                        MD5

                                                                        78f90fba2935cb2d28fd34c07da3b55d

                                                                        SHA1

                                                                        9aec4a1eaddcf108d2ad36a550a0c0c518fa1b0c

                                                                        SHA256

                                                                        9f3d4b1e08a1d4a51c8fbb6853f4e9d80d5b8b9b2191ff7511a67921a8cbcd70

                                                                        SHA512

                                                                        4df91617623386db538f582eb2e5dad4cc2acf9935bc318614daf46eac78c2dbd5b6aaacfb69b14f6ab2893fc8157fb7449fe9dd1bd26d7f460a8749253f7c8f

                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\datareporting\glean\db\data.safe.tmp

                                                                        Filesize

                                                                        5KB

                                                                        MD5

                                                                        322668eefa3da89586efb9cef017584f

                                                                        SHA1

                                                                        34cf83969a8febd3464cfc134b856b6f71f31d08

                                                                        SHA256

                                                                        e544b49b15b1c8e9c21be0ec759452e6d006d627d91836f02a23c87fc364d911

                                                                        SHA512

                                                                        70cbf98beb2d3b189ea0b4a9df695b07e055948aaf6df693c9936d40bb716b56753181cd0b9fde0d490403f28f3901a8ca2e51b979333abcaf63621ac860b1b9

                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\datareporting\glean\pending_pings\8c0606dd-7277-4142-9624-27a1794450a2

                                                                        Filesize

                                                                        982B

                                                                        MD5

                                                                        cb46d583ca55ffd4ef96735885037b44

                                                                        SHA1

                                                                        cd8a194e133d64652d0061653c3ea3051280298d

                                                                        SHA256

                                                                        cbd16815d89a5deadbf169e911d69fe398a817fa72c8e547789a349d1e6b9aa2

                                                                        SHA512

                                                                        752db4c91f848be05c3913941206664b4ecfec303a2013b45eb5c71eff50529d6aa51cc10c90eaffdf9e6a44776a612fd73563bde5676284745bca2df2b77588

                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\datareporting\glean\pending_pings\bac97ac1-2452-49e8-ad8b-3780d8f9a8ce

                                                                        Filesize

                                                                        671B

                                                                        MD5

                                                                        aed504f5e70163d0cea26f341e1a4d1d

                                                                        SHA1

                                                                        6cde1a21799f0c82fb5c0cdc8711d6fd9cd4045b

                                                                        SHA256

                                                                        fdfb71a90a8c44da2237856506f287bcb9c2161b6883a74213fea689eae623ea

                                                                        SHA512

                                                                        b48569bea36296a6b4f9397c0880729e45bcddbc8eff19e201994765fedb0905c566f4e5cea6d4268c9ef2bf382d4b1edd622333618df35b6460819b6a6e20e3

                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\datareporting\glean\pending_pings\c583d205-40bb-4a5c-acbf-ebd78d189f2a

                                                                        Filesize

                                                                        27KB

                                                                        MD5

                                                                        dfbf951d3400071c4b57453daca23654

                                                                        SHA1

                                                                        83dc7b85672265b0eba68e3255259058d7f4c80b

                                                                        SHA256

                                                                        ca73f540119be7d03f5b00d12ecaed19fa0c9905dc1a07301cf79e69973df0ab

                                                                        SHA512

                                                                        fed5ba41b258983bdfdd6788821b6dce3a9f6235cf44b20d078438f309f25298023b22aac559e17f35b815b3903a65de397d256b5a0ca1a396a241134f07939d

                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                                        Filesize

                                                                        1.1MB

                                                                        MD5

                                                                        842039753bf41fa5e11b3a1383061a87

                                                                        SHA1

                                                                        3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                                        SHA256

                                                                        d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                                        SHA512

                                                                        d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                                        Filesize

                                                                        116B

                                                                        MD5

                                                                        2a461e9eb87fd1955cea740a3444ee7a

                                                                        SHA1

                                                                        b10755914c713f5a4677494dbe8a686ed458c3c5

                                                                        SHA256

                                                                        4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                                        SHA512

                                                                        34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                                        Filesize

                                                                        372B

                                                                        MD5

                                                                        bf957ad58b55f64219ab3f793e374316

                                                                        SHA1

                                                                        a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                                        SHA256

                                                                        bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                                        SHA512

                                                                        79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                                        Filesize

                                                                        17.8MB

                                                                        MD5

                                                                        daf7ef3acccab478aaa7d6dc1c60f865

                                                                        SHA1

                                                                        f8246162b97ce4a945feced27b6ea114366ff2ad

                                                                        SHA256

                                                                        bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                                        SHA512

                                                                        5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\prefs-1.js

                                                                        Filesize

                                                                        12KB

                                                                        MD5

                                                                        a040a461923d42dfc07c2acbc5ddb148

                                                                        SHA1

                                                                        1d90258477e0f5157e2a3ebded2c2137aa25975e

                                                                        SHA256

                                                                        a873c0503b2d57317984dadf1e2dbcbfb2270153770487cf8932f2b53e25da7c

                                                                        SHA512

                                                                        4900d5193a1b5bb90bc699d9ac9c39b838b099bb9ca498c081eb329a8e1acbff59e265e60c14362be372771fa9450cba50d50484a5afb14593582f63fb4389af

                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\prefs-1.js

                                                                        Filesize

                                                                        11KB

                                                                        MD5

                                                                        2aa60f8e1aef4c85dd0ce8603bd3fb50

                                                                        SHA1

                                                                        0757578f5f11dd3ea12f311520d5a5cdd7ed45c3

                                                                        SHA256

                                                                        7aacda4d13c30505d30b551e2b80db1c9e5c1b822725db8e40c87ad48061c87e

                                                                        SHA512

                                                                        053e4d1eb543f91f1be5f3deef2b63cd7e0ef9a1d951b241a51429b0b008127d54ed97d3cd32c648c5b58efc5fb38ac440ef472111f87a9f6736b13fa9404151

                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\prefs-1.js

                                                                        Filesize

                                                                        14KB

                                                                        MD5

                                                                        6fafdcb90ea10f2e599c734887d7537e

                                                                        SHA1

                                                                        b3cd8ca4af5e7b47d91be0e4149d7c9c230a0638

                                                                        SHA256

                                                                        15d50a72539bbf5767e9122c23a6bd11ff6939ba044c5e7c70b51d774c309645

                                                                        SHA512

                                                                        30a394b00b8c83e155eb65951f9bb76088cd89465e701fbab3f073d32e8426c3cd495bbed622520cceaa569c77489af77f61c0023980ac5e0ae2c4aa3ceb31c6

                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\prefs-1.js

                                                                        Filesize

                                                                        14KB

                                                                        MD5

                                                                        b636dc0399dbddb5ce863c37faed1892

                                                                        SHA1

                                                                        239ddf43f58b9dc838922dec714f204778685946

                                                                        SHA256

                                                                        3886b86607440a9668037b68c9ce183bc6a6341f6811fc2622d2718664f24abe

                                                                        SHA512

                                                                        b67efc5d0b11d2a102fc12d75fbc6eaa236ba8a135b1297b5c9d6c8f8ec121e7e44cb7da7d9d68342e144d2c18cb9dddfb475fdb974e3aaeba370173776fb251

                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\prefs.js

                                                                        Filesize

                                                                        11KB

                                                                        MD5

                                                                        c776b3570beb1ef7b4e2fd8b1a1d0f45

                                                                        SHA1

                                                                        fcf3ec6c0744edb19c22b46344d44b62d9a5808c

                                                                        SHA256

                                                                        f1cea28f324673d7bbffbdc46266ddd042b06bb38c4552b526025c403deced8f

                                                                        SHA512

                                                                        a4cc061c5c44d8002af3dc3a2b667aad491ba17a046145f55488db6c9ed6a8d4b1cc983ee27934ecfe53859c6ae29b94eee95595b801c38b8d191d6aebe4f699

                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\sessionstore-backups\recovery.baklz4

                                                                        Filesize

                                                                        1KB

                                                                        MD5

                                                                        1e17f29b676eb6c0ca45390163320898

                                                                        SHA1

                                                                        5d6b048950e98a85c50b69e6680fce3feb8b25c6

                                                                        SHA256

                                                                        4f4ed262be0070a6a861b1cc5d6c0af7afdb9d1abff133d7f8dde9061512748a

                                                                        SHA512

                                                                        f2d2ffbbf15f1d1778fd1db37012b15f80abf38e2b8dfa09212dee94f960a37a984df16fb058a72a789750016af254e7fd6263007504ab114034c6a7e5685c48

                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmd08l7e.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                                        Filesize

                                                                        1.6MB

                                                                        MD5

                                                                        3f7333f20a3811330adde6819b392fb2

                                                                        SHA1

                                                                        d29d222e33ee703d80ea7ae11d9cdc983b1bb349

                                                                        SHA256

                                                                        ae22f481530c59f591e88496cd7170d7ca73d4689e40ae9bc96d31f8e03233da

                                                                        SHA512

                                                                        128d8c2cc9b7cefa8f4a747ba71651927e9dfdde299305e10181d093659dda07255ac6649c24eb813023f084c662d7cdf70a01a452e1d2d3c9db7115f7689720

                                                                      • C:\Users\Admin\AppData\Roaming\d3d9.dll

                                                                        Filesize

                                                                        534KB

                                                                        MD5

                                                                        a6da8d868dbd5c9fe6b505db0ee7eb71

                                                                        SHA1

                                                                        3dad32b3b3230ad6f44b82d1eb1749c67800c6f8

                                                                        SHA256

                                                                        4ad69afb341c6d8021db1d9b0b7e56d14b020a0d70739e31f0b65861f3c4eb2c

                                                                        SHA512

                                                                        132f54ac3116fd644c57840c893dae2128f571a784ceaa6dd78bafa3e05fc8f2a9d2458f1e1cf321b6cecc2423d3c57ff6d3c4b6b60f92a41b665105a3262dd0

                                                                      • C:\Users\Admin\AppData\Roaming\kySHTE87Kb.exe

                                                                        Filesize

                                                                        304KB

                                                                        MD5

                                                                        12f13e368d8f8a329c94302ca0bd5d8a

                                                                        SHA1

                                                                        17fdaeb0122b61c702ec7a4c809fc26ca4cb73bf

                                                                        SHA256

                                                                        570aaaf62baff05ca992f53356044c86f85f46014451b85f8306915fef498a24

                                                                        SHA512

                                                                        031c116d0fe92912363eb7e580dea59504d4de5ac4fc51a1cf8d85393585c0acc712256142a88d33ebdf5b616068ca02066806cea6f4c0072a50f0b0144440da

                                                                      • C:\Users\Admin\Desktop\Microsoft Edge.lnk

                                                                        Filesize

                                                                        2KB

                                                                        MD5

                                                                        eeac0d654532a6cbab82845c88c231dd

                                                                        SHA1

                                                                        efa38c36fceca042c07c5e56b1cd378658ff3905

                                                                        SHA256

                                                                        6ee60f764ba971299506baef52c0df542cde42e0a58fa77dd08875ac772ebc76

                                                                        SHA512

                                                                        83f0679b50d7ca7836ffe3ca082244b9977432fa02198018dc7e08dee2e7c3df96982542ef6dc10034c30349b284647656f0319a8f9d799a0fcf5def7017ea11

                                                                      • C:\Users\Public\Desktop\Google Chrome.lnk

                                                                        Filesize

                                                                        2KB

                                                                        MD5

                                                                        aac5f4ec2d1c4c6de526c560be1321a7

                                                                        SHA1

                                                                        ad0bf4e7a78040add16b8c5b0c7c1c8e379eef92

                                                                        SHA256

                                                                        8cc07a2f0d7d04b149bcd0a6a54823428e267a69816e07dc4173567c847f7f07

                                                                        SHA512

                                                                        1e99f45d1884c97776d3e038fb509e3f48fa8fd89df4dd2709f1daa0af97e5afefc216a64f820a6ed753cf203fbe9a90aee09943dc782556db13b4d8bf21fa2b

                                                                      • C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\0F7DB30017D5DEE2D017D128E9912689A2E8B0F0

                                                                        Filesize

                                                                        1KB

                                                                        MD5

                                                                        e6c02b5c1d112e4721db8a5ac34e55cc

                                                                        SHA1

                                                                        51a70d8d758bb50ff39ee8e3fa792ba594df5d4f

                                                                        SHA256

                                                                        7160ec88332abea2c47299093b7bb07472f8332a4d7c33d225039b1241ad24c8

                                                                        SHA512

                                                                        0a39970ecf02195a2cb751a19ae6a6ba7def85accbfeff5b12dcf8b280e97eaa5f5fd9edaba3660572b7a97944a32ac1e21575a997ec096841c8a37fac79dca5

                                                                      • memory/468-367-0x0000000000400000-0x000000000081B000-memory.dmp

                                                                        Filesize

                                                                        4.1MB

                                                                      • memory/712-3551-0x0000000000780000-0x0000000000C5E000-memory.dmp

                                                                        Filesize

                                                                        4.9MB

                                                                      • memory/712-3812-0x0000000000780000-0x0000000000C5E000-memory.dmp

                                                                        Filesize

                                                                        4.9MB

                                                                      • memory/888-674-0x000000001C680000-0x000000001C75B000-memory.dmp

                                                                        Filesize

                                                                        876KB

                                                                      • memory/888-3520-0x00000000014D0000-0x000000000151C000-memory.dmp

                                                                        Filesize

                                                                        304KB

                                                                      • memory/888-657-0x000000001C680000-0x000000001C75B000-memory.dmp

                                                                        Filesize

                                                                        876KB

                                                                      • memory/888-670-0x000000001C680000-0x000000001C75B000-memory.dmp

                                                                        Filesize

                                                                        876KB

                                                                      • memory/888-676-0x000000001C680000-0x000000001C75B000-memory.dmp

                                                                        Filesize

                                                                        876KB

                                                                      • memory/888-656-0x000000001C680000-0x000000001C762000-memory.dmp

                                                                        Filesize

                                                                        904KB

                                                                      • memory/888-655-0x0000000000B60000-0x0000000000C14000-memory.dmp

                                                                        Filesize

                                                                        720KB

                                                                      • memory/888-682-0x000000001C680000-0x000000001C75B000-memory.dmp

                                                                        Filesize

                                                                        876KB

                                                                      • memory/888-680-0x000000001C680000-0x000000001C75B000-memory.dmp

                                                                        Filesize

                                                                        876KB

                                                                      • memory/888-672-0x000000001C680000-0x000000001C75B000-memory.dmp

                                                                        Filesize

                                                                        876KB

                                                                      • memory/888-3519-0x000000001CBF0000-0x000000001CC62000-memory.dmp

                                                                        Filesize

                                                                        456KB

                                                                      • memory/888-678-0x000000001C680000-0x000000001C75B000-memory.dmp

                                                                        Filesize

                                                                        876KB

                                                                      • memory/888-658-0x000000001C680000-0x000000001C75B000-memory.dmp

                                                                        Filesize

                                                                        876KB

                                                                      • memory/888-660-0x000000001C680000-0x000000001C75B000-memory.dmp

                                                                        Filesize

                                                                        876KB

                                                                      • memory/888-662-0x000000001C680000-0x000000001C75B000-memory.dmp

                                                                        Filesize

                                                                        876KB

                                                                      • memory/888-664-0x000000001C680000-0x000000001C75B000-memory.dmp

                                                                        Filesize

                                                                        876KB

                                                                      • memory/888-666-0x000000001C680000-0x000000001C75B000-memory.dmp

                                                                        Filesize

                                                                        876KB

                                                                      • memory/888-668-0x000000001C680000-0x000000001C75B000-memory.dmp

                                                                        Filesize

                                                                        876KB

                                                                      • memory/1136-321-0x0000000000200000-0x0000000000280000-memory.dmp

                                                                        Filesize

                                                                        512KB

                                                                      • memory/1244-463-0x0000000006270000-0x000000000628A000-memory.dmp

                                                                        Filesize

                                                                        104KB

                                                                      • memory/1244-340-0x0000000000710000-0x0000000000788000-memory.dmp

                                                                        Filesize

                                                                        480KB

                                                                      • memory/1448-4-0x0000000000DA0000-0x0000000001252000-memory.dmp

                                                                        Filesize

                                                                        4.7MB

                                                                      • memory/1448-18-0x0000000000DA0000-0x0000000001252000-memory.dmp

                                                                        Filesize

                                                                        4.7MB

                                                                      • memory/1448-1-0x0000000077274000-0x0000000077276000-memory.dmp

                                                                        Filesize

                                                                        8KB

                                                                      • memory/1448-0-0x0000000000DA0000-0x0000000001252000-memory.dmp

                                                                        Filesize

                                                                        4.7MB

                                                                      • memory/1448-2-0x0000000000DA1000-0x0000000000DCF000-memory.dmp

                                                                        Filesize

                                                                        184KB

                                                                      • memory/1448-3-0x0000000000DA0000-0x0000000001252000-memory.dmp

                                                                        Filesize

                                                                        4.7MB

                                                                      • memory/1572-110-0x0000000000400000-0x0000000000511000-memory.dmp

                                                                        Filesize

                                                                        1.1MB

                                                                      • memory/1572-112-0x0000000000400000-0x0000000000511000-memory.dmp

                                                                        Filesize

                                                                        1.1MB

                                                                      • memory/1572-113-0x0000000000400000-0x0000000000511000-memory.dmp

                                                                        Filesize

                                                                        1.1MB

                                                                      • memory/1572-106-0x0000000000400000-0x0000000000511000-memory.dmp

                                                                        Filesize

                                                                        1.1MB

                                                                      • memory/1572-138-0x0000000000400000-0x0000000000511000-memory.dmp

                                                                        Filesize

                                                                        1.1MB

                                                                      • memory/1596-405-0x0000000000150000-0x0000000000393000-memory.dmp

                                                                        Filesize

                                                                        2.3MB

                                                                      • memory/1596-192-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                        Filesize

                                                                        972KB

                                                                      • memory/1596-190-0x0000000000150000-0x0000000000393000-memory.dmp

                                                                        Filesize

                                                                        2.3MB

                                                                      • memory/2288-6482-0x0000000005B60000-0x0000000005DFC000-memory.dmp

                                                                        Filesize

                                                                        2.6MB

                                                                      • memory/2288-6481-0x00000000057B0000-0x0000000005A58000-memory.dmp

                                                                        Filesize

                                                                        2.7MB

                                                                      • memory/2288-6483-0x0000000005490000-0x00000000054B2000-memory.dmp

                                                                        Filesize

                                                                        136KB

                                                                      • memory/2288-5137-0x0000000000140000-0x0000000000BD2000-memory.dmp

                                                                        Filesize

                                                                        10.6MB

                                                                      • memory/3024-145-0x0000000000A90000-0x0000000000AE2000-memory.dmp

                                                                        Filesize

                                                                        328KB

                                                                      • memory/3024-404-0x0000000007AF0000-0x0000000007B40000-memory.dmp

                                                                        Filesize

                                                                        320KB

                                                                      • memory/3024-506-0x0000000000500000-0x0000000000BA3000-memory.dmp

                                                                        Filesize

                                                                        6.6MB

                                                                      • memory/3024-502-0x0000000000500000-0x0000000000BA3000-memory.dmp

                                                                        Filesize

                                                                        6.6MB

                                                                      • memory/3044-42-0x0000000000390000-0x00000000003E4000-memory.dmp

                                                                        Filesize

                                                                        336KB

                                                                      • memory/3044-41-0x0000000072E8E000-0x0000000072E8F000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/3308-49-0x0000000005020000-0x00000000050B2000-memory.dmp

                                                                        Filesize

                                                                        584KB

                                                                      • memory/3308-92-0x0000000006DD0000-0x0000000006DE2000-memory.dmp

                                                                        Filesize

                                                                        72KB

                                                                      • memory/3308-50-0x00000000050C0000-0x00000000050CA000-memory.dmp

                                                                        Filesize

                                                                        40KB

                                                                      • memory/3308-85-0x0000000006540000-0x000000000655E000-memory.dmp

                                                                        Filesize

                                                                        120KB

                                                                      • memory/3308-90-0x0000000006ED0000-0x00000000074E8000-memory.dmp

                                                                        Filesize

                                                                        6.1MB

                                                                      • memory/3308-91-0x0000000008750000-0x000000000885A000-memory.dmp

                                                                        Filesize

                                                                        1.0MB

                                                                      • memory/3308-67-0x0000000005D60000-0x0000000005DD6000-memory.dmp

                                                                        Filesize

                                                                        472KB

                                                                      • memory/3308-45-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                        Filesize

                                                                        328KB

                                                                      • memory/3308-94-0x0000000006E70000-0x0000000006EBC000-memory.dmp

                                                                        Filesize

                                                                        304KB

                                                                      • memory/3308-93-0x0000000006E30000-0x0000000006E6C000-memory.dmp

                                                                        Filesize

                                                                        240KB

                                                                      • memory/3308-48-0x00000000054F0000-0x0000000005A94000-memory.dmp

                                                                        Filesize

                                                                        5.6MB

                                                                      • memory/3328-362-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                        Filesize

                                                                        2.3MB

                                                                      • memory/3328-503-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                        Filesize

                                                                        2.3MB

                                                                      • memory/3328-366-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                        Filesize

                                                                        2.3MB

                                                                      • memory/3328-365-0x0000000000400000-0x0000000000643000-memory.dmp

                                                                        Filesize

                                                                        2.3MB

                                                                      • memory/3504-620-0x0000000000AD0000-0x0000000000B22000-memory.dmp

                                                                        Filesize

                                                                        328KB

                                                                      • memory/3556-465-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                        Filesize

                                                                        328KB

                                                                      • memory/3692-391-0x0000000000EA0000-0x0000000000F4E000-memory.dmp

                                                                        Filesize

                                                                        696KB

                                                                      • memory/3708-400-0x0000000000230000-0x0000000000284000-memory.dmp

                                                                        Filesize

                                                                        336KB

                                                                      • memory/3708-403-0x0000000000230000-0x0000000000284000-memory.dmp

                                                                        Filesize

                                                                        336KB

                                                                      • memory/3708-398-0x0000000000230000-0x0000000000284000-memory.dmp

                                                                        Filesize

                                                                        336KB

                                                                      • memory/3808-588-0x0000000000400000-0x0000000001064000-memory.dmp

                                                                        Filesize

                                                                        12.4MB

                                                                      • memory/4220-89-0x0000000000ED0000-0x0000000000FE6000-memory.dmp

                                                                        Filesize

                                                                        1.1MB

                                                                      • memory/4400-261-0x000000000A5B0000-0x000000000AADC000-memory.dmp

                                                                        Filesize

                                                                        5.2MB

                                                                      • memory/4400-253-0x0000000008DB0000-0x0000000008E16000-memory.dmp

                                                                        Filesize

                                                                        408KB

                                                                      • memory/4400-260-0x0000000009EB0000-0x000000000A072000-memory.dmp

                                                                        Filesize

                                                                        1.8MB

                                                                      • memory/4400-153-0x0000000000800000-0x0000000000892000-memory.dmp

                                                                        Filesize

                                                                        584KB

                                                                      • memory/4540-462-0x0000000000DF0000-0x0000000000E44000-memory.dmp

                                                                        Filesize

                                                                        336KB

                                                                      • memory/4604-16-0x0000000000610000-0x0000000000AC2000-memory.dmp

                                                                        Filesize

                                                                        4.7MB

                                                                      • memory/4604-209-0x0000000000610000-0x0000000000AC2000-memory.dmp

                                                                        Filesize

                                                                        4.7MB

                                                                      • memory/4604-117-0x0000000000610000-0x0000000000AC2000-memory.dmp

                                                                        Filesize

                                                                        4.7MB

                                                                      • memory/4604-589-0x0000000000610000-0x0000000000AC2000-memory.dmp

                                                                        Filesize

                                                                        4.7MB

                                                                      • memory/4604-22-0x0000000000610000-0x0000000000AC2000-memory.dmp

                                                                        Filesize

                                                                        4.7MB

                                                                      • memory/4604-460-0x0000000000610000-0x0000000000AC2000-memory.dmp

                                                                        Filesize

                                                                        4.7MB

                                                                      • memory/4604-191-0x0000000000610000-0x0000000000AC2000-memory.dmp

                                                                        Filesize

                                                                        4.7MB

                                                                      • memory/4604-566-0x0000000000610000-0x0000000000AC2000-memory.dmp

                                                                        Filesize

                                                                        4.7MB

                                                                      • memory/4604-21-0x0000000000610000-0x0000000000AC2000-memory.dmp

                                                                        Filesize

                                                                        4.7MB

                                                                      • memory/4604-19-0x0000000000611000-0x000000000063F000-memory.dmp

                                                                        Filesize

                                                                        184KB

                                                                      • memory/4604-20-0x0000000000610000-0x0000000000AC2000-memory.dmp

                                                                        Filesize

                                                                        4.7MB

                                                                      • memory/4760-4053-0x0000000005780000-0x0000000005A22000-memory.dmp

                                                                        Filesize

                                                                        2.6MB

                                                                      • memory/4760-586-0x0000000000070000-0x0000000000AB6000-memory.dmp

                                                                        Filesize

                                                                        10.3MB

                                                                      • memory/4760-587-0x0000000005360000-0x00000000053FC000-memory.dmp

                                                                        Filesize

                                                                        624KB

                                                                      • memory/4760-4055-0x0000000005A20000-0x0000000005CB6000-memory.dmp

                                                                        Filesize

                                                                        2.6MB

                                                                      • memory/4760-4056-0x0000000005330000-0x0000000005352000-memory.dmp

                                                                        Filesize

                                                                        136KB

                                                                      • memory/5288-3522-0x0000000000610000-0x0000000000AC2000-memory.dmp

                                                                        Filesize

                                                                        4.7MB

                                                                      • memory/5288-2989-0x0000000000610000-0x0000000000AC2000-memory.dmp

                                                                        Filesize

                                                                        4.7MB

                                                                      • memory/5372-3580-0x0000000000D80000-0x0000000001423000-memory.dmp

                                                                        Filesize

                                                                        6.6MB

                                                                      • memory/5372-3583-0x0000000000D80000-0x0000000001423000-memory.dmp

                                                                        Filesize

                                                                        6.6MB

                                                                      • memory/5476-5886-0x0000000000610000-0x0000000000AC2000-memory.dmp

                                                                        Filesize

                                                                        4.7MB

                                                                      • memory/5476-5928-0x0000000000610000-0x0000000000AC2000-memory.dmp

                                                                        Filesize

                                                                        4.7MB

                                                                      • memory/5556-3536-0x0000000000190000-0x000000000066E000-memory.dmp

                                                                        Filesize

                                                                        4.9MB

                                                                      • memory/5556-3549-0x0000000000190000-0x000000000066E000-memory.dmp

                                                                        Filesize

                                                                        4.9MB

                                                                      • memory/5672-4072-0x0000000000870000-0x0000000000F13000-memory.dmp

                                                                        Filesize

                                                                        6.6MB

                                                                      • memory/5672-4043-0x0000000000870000-0x0000000000F13000-memory.dmp

                                                                        Filesize

                                                                        6.6MB

                                                                      • memory/6688-4030-0x0000000005870000-0x0000000005BC4000-memory.dmp

                                                                        Filesize

                                                                        3.3MB

                                                                      • memory/6688-3964-0x0000000004D50000-0x0000000005378000-memory.dmp

                                                                        Filesize

                                                                        6.2MB

                                                                      • memory/6688-4013-0x0000000005600000-0x0000000005622000-memory.dmp

                                                                        Filesize

                                                                        136KB

                                                                      • memory/6688-4014-0x0000000005800000-0x0000000005866000-memory.dmp

                                                                        Filesize

                                                                        408KB

                                                                      • memory/6688-4125-0x0000000005C80000-0x0000000005C88000-memory.dmp

                                                                        Filesize

                                                                        32KB

                                                                      • memory/6688-4086-0x0000000007EC0000-0x000000000853A000-memory.dmp

                                                                        Filesize

                                                                        6.5MB

                                                                      • memory/6688-4083-0x0000000006C40000-0x0000000006CD6000-memory.dmp

                                                                        Filesize

                                                                        600KB

                                                                      • memory/6688-4084-0x00000000061B0000-0x00000000061CA000-memory.dmp

                                                                        Filesize

                                                                        104KB

                                                                      • memory/6688-4085-0x0000000006200000-0x0000000006222000-memory.dmp

                                                                        Filesize

                                                                        136KB

                                                                      • memory/6688-3963-0x0000000002310000-0x0000000002346000-memory.dmp

                                                                        Filesize

                                                                        216KB

                                                                      • memory/6688-4064-0x00000000056E0000-0x00000000056FE000-memory.dmp

                                                                        Filesize

                                                                        120KB

                                                                      • memory/6700-5918-0x0000000000780000-0x0000000000C5E000-memory.dmp

                                                                        Filesize

                                                                        4.9MB